2009-12-08 17:18:12 -08:00
|
|
|
|
/*
|
2013-01-15 13:23:53 -08:00
|
|
|
|
* Copyright (c) 2009, 2010, 2011, 2012, 2013 Nicira, Inc.
|
2009-12-08 17:18:12 -08:00
|
|
|
|
*
|
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
|
* You may obtain a copy of the License at:
|
|
|
|
|
*
|
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
*
|
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
|
* limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
#include <ctype.h>
|
2009-12-08 17:18:12 -08:00
|
|
|
|
#include <errno.h>
|
2010-01-25 10:13:52 -08:00
|
|
|
|
#include <float.h>
|
2009-12-08 17:18:12 -08:00
|
|
|
|
#include <getopt.h>
|
|
|
|
|
#include <inttypes.h>
|
|
|
|
|
#include <signal.h>
|
|
|
|
|
#include <stdarg.h>
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
2011-05-09 10:29:51 -07:00
|
|
|
|
#include <unistd.h>
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
#include "command-line.h"
|
|
|
|
|
#include "compiler.h"
|
|
|
|
|
#include "dirs.h"
|
|
|
|
|
#include "dynamic-string.h"
|
2012-04-17 16:56:21 -07:00
|
|
|
|
#include "hash.h"
|
2009-12-16 16:26:17 -08:00
|
|
|
|
#include "json.h"
|
2010-01-25 10:13:52 -08:00
|
|
|
|
#include "ovsdb-data.h"
|
2009-12-08 17:18:12 -08:00
|
|
|
|
#include "ovsdb-idl.h"
|
|
|
|
|
#include "poll-loop.h"
|
2010-01-28 16:09:26 -08:00
|
|
|
|
#include "process.h"
|
2011-02-10 09:34:42 -08:00
|
|
|
|
#include "stream.h"
|
2010-03-23 15:29:10 -07:00
|
|
|
|
#include "stream-ssl.h"
|
2012-05-22 01:53:07 -07:00
|
|
|
|
#include "smap.h"
|
2011-03-25 15:26:30 -07:00
|
|
|
|
#include "sset.h"
|
2009-12-09 13:28:48 -08:00
|
|
|
|
#include "svec.h"
|
2012-03-27 15:57:52 -07:00
|
|
|
|
#include "lib/vswitch-idl.h"
|
2011-02-08 16:10:34 -08:00
|
|
|
|
#include "table.h"
|
2009-12-08 17:18:12 -08:00
|
|
|
|
#include "timeval.h"
|
|
|
|
|
#include "util.h"
|
2011-10-12 00:03:10 -07:00
|
|
|
|
#include "vconn.h"
|
2009-12-08 17:18:12 -08:00
|
|
|
|
#include "vlog.h"
|
2010-07-16 11:02:49 -07:00
|
|
|
|
|
2010-10-19 14:47:01 -07:00
|
|
|
|
VLOG_DEFINE_THIS_MODULE(vsctl);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-02-02 14:25:11 -08:00
|
|
|
|
/* vsctl_fatal() also logs the error, so it is preferred in this file. */
|
|
|
|
|
#define ovs_fatal please_use_vsctl_fatal_instead_of_ovs_fatal
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct vsctl_context;
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
/* A command supported by ovs-vsctl. */
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct vsctl_command_syntax {
|
2010-11-16 09:15:40 -08:00
|
|
|
|
const char *name; /* e.g. "add-br" */
|
|
|
|
|
int min_args; /* Min number of arguments following name. */
|
|
|
|
|
int max_args; /* Max number of arguments following name. */
|
|
|
|
|
|
|
|
|
|
/* If nonnull, calls ovsdb_idl_add_column() or ovsdb_idl_add_table() for
|
|
|
|
|
* each column or table in ctx->idl that it uses. */
|
|
|
|
|
void (*prerequisites)(struct vsctl_context *ctx);
|
|
|
|
|
|
|
|
|
|
/* Does the actual work of the command and puts the command's output, if
|
2011-02-08 16:10:34 -08:00
|
|
|
|
* any, in ctx->output or ctx->table.
|
2010-11-16 09:15:40 -08:00
|
|
|
|
*
|
|
|
|
|
* Alternatively, if some prerequisite of the command is not met and the
|
|
|
|
|
* caller should wait for something to change and then retry, it may set
|
|
|
|
|
* ctx->try_again to true. (Only the "wait-until" command currently does
|
|
|
|
|
* this.) */
|
|
|
|
|
void (*run)(struct vsctl_context *ctx);
|
|
|
|
|
|
|
|
|
|
/* If nonnull, called after the transaction has been successfully
|
|
|
|
|
* committed. ctx->output is the output from the "run" function, which
|
|
|
|
|
* this function may modify and otherwise postprocess as needed. (Only the
|
|
|
|
|
* "create" command currently does any postprocessing.) */
|
|
|
|
|
void (*postprocess)(struct vsctl_context *ctx);
|
|
|
|
|
|
|
|
|
|
/* A comma-separated list of supported options, e.g. "--a,--b", or the
|
|
|
|
|
* empty string if the command does not support any options. */
|
2010-01-28 16:09:26 -08:00
|
|
|
|
const char *options;
|
2010-09-01 13:42:33 -07:00
|
|
|
|
enum { RO, RW } mode; /* Does this command modify the database? */
|
2010-01-28 16:09:26 -08:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct vsctl_command {
|
|
|
|
|
/* Data that remains constant after initialization. */
|
|
|
|
|
const struct vsctl_command_syntax *syntax;
|
|
|
|
|
int argc;
|
|
|
|
|
char **argv;
|
|
|
|
|
struct shash options;
|
|
|
|
|
|
|
|
|
|
/* Data modified by commands. */
|
|
|
|
|
struct ds output;
|
2011-02-08 16:10:34 -08:00
|
|
|
|
struct table *table;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
};
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
/* --db: The database server to contact. */
|
|
|
|
|
static const char *db;
|
|
|
|
|
|
|
|
|
|
/* --oneline: Write each command's output as a single line? */
|
|
|
|
|
static bool oneline;
|
|
|
|
|
|
2009-12-11 11:28:36 -08:00
|
|
|
|
/* --dry-run: Do not commit any changes. */
|
|
|
|
|
static bool dry_run;
|
|
|
|
|
|
2009-12-16 16:26:17 -08:00
|
|
|
|
/* --no-wait: Wait for ovs-vswitchd to reload its configuration? */
|
|
|
|
|
static bool wait_for_reload = true;
|
|
|
|
|
|
2009-12-14 13:59:58 -08:00
|
|
|
|
/* --timeout: Time to wait for a connection to 'db'. */
|
2010-09-17 14:37:51 -07:00
|
|
|
|
static int timeout;
|
2009-12-14 13:59:58 -08:00
|
|
|
|
|
2013-03-15 16:14:28 -07:00
|
|
|
|
/* --retry: If true, ovs-vsctl will retry connecting to the database forever.
|
|
|
|
|
* If false and --db says to use an active connection method (e.g. "unix:",
|
|
|
|
|
* "tcp:", "ssl:"), then ovs-vsctl will try to connect once and exit with an
|
|
|
|
|
* error if the database server cannot be contacted (e.g. ovsdb-server is not
|
|
|
|
|
* running).
|
|
|
|
|
*
|
|
|
|
|
* Regardless of this setting, --timeout always limits how long ovs-vsctl will
|
|
|
|
|
* wait. */
|
|
|
|
|
static bool retry;
|
|
|
|
|
|
2011-02-08 16:10:34 -08:00
|
|
|
|
/* Format for table output. */
|
|
|
|
|
static struct table_style table_style = TABLE_STYLE_DEFAULT;
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
/* All supported commands. */
|
2013-07-19 10:04:47 -07:00
|
|
|
|
static const struct vsctl_command_syntax *get_all_commands(void);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
2010-02-02 14:26:17 -08:00
|
|
|
|
/* The IDL we're using and the current transaction, if any.
|
|
|
|
|
* This is for use by vsctl_exit() only, to allow it to clean up.
|
|
|
|
|
* Other code should use its context arguments. */
|
|
|
|
|
static struct ovsdb_idl *the_idl;
|
|
|
|
|
static struct ovsdb_idl_txn *the_idl_txn;
|
|
|
|
|
|
|
|
|
|
static void vsctl_exit(int status) NO_RETURN;
|
2009-12-10 16:05:20 -08:00
|
|
|
|
static void vsctl_fatal(const char *, ...) PRINTF_FORMAT(1, 2) NO_RETURN;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static char *default_db(void);
|
|
|
|
|
static void usage(void) NO_RETURN;
|
2012-12-10 14:24:36 -08:00
|
|
|
|
static void parse_options(int argc, char *argv[], struct shash *local_options);
|
2010-09-01 13:42:33 -07:00
|
|
|
|
static bool might_write_to_db(char **argv);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
static struct vsctl_command *parse_commands(int argc, char *argv[],
|
2012-12-10 14:24:36 -08:00
|
|
|
|
struct shash *local_options,
|
2010-01-28 16:09:26 -08:00
|
|
|
|
size_t *n_commandsp);
|
2012-12-10 14:24:36 -08:00
|
|
|
|
static void parse_command(int argc, char *argv[], struct shash *local_options,
|
|
|
|
|
struct vsctl_command *);
|
2010-09-01 13:41:09 -07:00
|
|
|
|
static const struct vsctl_command_syntax *find_command(const char *name);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void run_prerequisites(struct vsctl_command[], size_t n_commands,
|
|
|
|
|
struct ovsdb_idl *);
|
2012-03-27 10:16:52 -07:00
|
|
|
|
static void do_vsctl(const char *args, struct vsctl_command *, size_t n,
|
|
|
|
|
struct ovsdb_idl *);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-04-05 12:58:21 -07:00
|
|
|
|
static const struct vsctl_table_class *get_table(const char *table_name);
|
|
|
|
|
static void set_column(const struct vsctl_table_class *,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
const struct ovsdb_idl_row *, const char *arg,
|
|
|
|
|
struct ovsdb_symbol_table *);
|
2010-04-05 12:58:21 -07:00
|
|
|
|
|
2011-02-08 10:21:59 -08:00
|
|
|
|
static bool is_condition_satisfied(const struct vsctl_table_class *,
|
|
|
|
|
const struct ovsdb_idl_row *,
|
|
|
|
|
const char *arg,
|
|
|
|
|
struct ovsdb_symbol_table *);
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
int
|
|
|
|
|
main(int argc, char *argv[])
|
|
|
|
|
{
|
2010-07-16 10:53:14 -07:00
|
|
|
|
extern struct vlog_module VLM_reconnect;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct ovsdb_idl *idl;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct vsctl_command *commands;
|
2012-12-10 14:24:36 -08:00
|
|
|
|
struct shash local_options;
|
2012-03-27 10:16:52 -07:00
|
|
|
|
unsigned int seqno;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
size_t n_commands;
|
|
|
|
|
char *args;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
set_program_name(argv[0]);
|
|
|
|
|
signal(SIGPIPE, SIG_IGN);
|
2010-07-16 10:53:14 -07:00
|
|
|
|
vlog_set_levels(NULL, VLF_CONSOLE, VLL_WARN);
|
|
|
|
|
vlog_set_levels(&VLM_reconnect, VLF_ANY_FACILITY, VLL_WARN);
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsrec_init();
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Log our arguments. This is often valuable for debugging systems. */
|
|
|
|
|
args = process_escape_args(argv);
|
2010-09-01 13:42:33 -07:00
|
|
|
|
VLOG(might_write_to_db(argv) ? VLL_INFO : VLL_DBG, "Called as %s", args);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Parse command line. */
|
2012-12-10 14:24:36 -08:00
|
|
|
|
shash_init(&local_options);
|
|
|
|
|
parse_options(argc, argv, &local_options);
|
|
|
|
|
commands = parse_commands(argc - optind, argv + optind, &local_options,
|
|
|
|
|
&n_commands);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2009-12-14 13:59:58 -08:00
|
|
|
|
if (timeout) {
|
|
|
|
|
time_alarm(timeout);
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
/* Initialize IDL. */
|
2013-03-15 16:14:28 -07:00
|
|
|
|
idl = the_idl = ovsdb_idl_create(db, &ovsrec_idl_class, false, retry);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
run_prerequisites(commands, n_commands, idl);
|
|
|
|
|
|
2012-03-27 10:16:52 -07:00
|
|
|
|
/* Execute the commands.
|
|
|
|
|
*
|
|
|
|
|
* 'seqno' is the database sequence number for which we last tried to
|
|
|
|
|
* execute our transaction. There's no point in trying to commit more than
|
|
|
|
|
* once for any given sequence number, because if the transaction fails
|
|
|
|
|
* it's because the database changed and we need to obtain an up-to-date
|
|
|
|
|
* view of the database before we try the transaction again. */
|
|
|
|
|
seqno = ovsdb_idl_get_seqno(idl);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
for (;;) {
|
2012-03-27 10:16:52 -07:00
|
|
|
|
ovsdb_idl_run(idl);
|
2013-03-15 16:14:28 -07:00
|
|
|
|
if (!ovsdb_idl_is_alive(idl)) {
|
|
|
|
|
int retval = ovsdb_idl_get_last_error(idl);
|
|
|
|
|
vsctl_fatal("%s: database connection failed (%s)",
|
|
|
|
|
db, ovs_retval_to_string(retval));
|
|
|
|
|
}
|
2012-03-27 10:16:52 -07:00
|
|
|
|
|
|
|
|
|
if (seqno != ovsdb_idl_get_seqno(idl)) {
|
|
|
|
|
seqno = ovsdb_idl_get_seqno(idl);
|
|
|
|
|
do_vsctl(args, commands, n_commands, idl);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-03-27 10:16:52 -07:00
|
|
|
|
if (seqno == ovsdb_idl_get_seqno(idl)) {
|
2011-10-31 09:15:14 -07:00
|
|
|
|
ovsdb_idl_wait(idl);
|
|
|
|
|
poll_block();
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-12-10 14:24:36 -08:00
|
|
|
|
static struct option *
|
|
|
|
|
find_option(const char *name, struct option *options, size_t n_options)
|
|
|
|
|
{
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < n_options; i++) {
|
|
|
|
|
if (!strcmp(options[i].name, name)) {
|
|
|
|
|
return &options[i];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct option *
|
|
|
|
|
add_option(struct option **optionsp, size_t *n_optionsp,
|
|
|
|
|
size_t *allocated_optionsp)
|
|
|
|
|
{
|
|
|
|
|
if (*n_optionsp >= *allocated_optionsp) {
|
|
|
|
|
*optionsp = x2nrealloc(*optionsp, allocated_optionsp,
|
|
|
|
|
sizeof **optionsp);
|
|
|
|
|
}
|
|
|
|
|
return &(*optionsp)[(*n_optionsp)++];
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2012-12-10 14:24:36 -08:00
|
|
|
|
parse_options(int argc, char *argv[], struct shash *local_options)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
enum {
|
|
|
|
|
OPT_DB = UCHAR_MAX + 1,
|
|
|
|
|
OPT_ONELINE,
|
2009-12-10 15:32:50 -08:00
|
|
|
|
OPT_NO_SYSLOG,
|
2009-12-11 11:28:36 -08:00
|
|
|
|
OPT_NO_WAIT,
|
2010-01-04 19:15:22 -08:00
|
|
|
|
OPT_DRY_RUN,
|
2010-03-23 15:29:10 -07:00
|
|
|
|
OPT_PEER_CA_CERT,
|
2012-12-10 14:24:36 -08:00
|
|
|
|
OPT_LOCAL,
|
2013-03-15 16:14:28 -07:00
|
|
|
|
OPT_RETRY,
|
2011-02-08 16:10:34 -08:00
|
|
|
|
VLOG_OPTION_ENUMS,
|
|
|
|
|
TABLE_OPTION_ENUMS
|
2009-12-08 17:18:12 -08:00
|
|
|
|
};
|
2012-12-10 14:24:36 -08:00
|
|
|
|
static const struct option global_long_options[] = {
|
2011-05-04 13:49:42 -07:00
|
|
|
|
{"db", required_argument, NULL, OPT_DB},
|
|
|
|
|
{"no-syslog", no_argument, NULL, OPT_NO_SYSLOG},
|
|
|
|
|
{"no-wait", no_argument, NULL, OPT_NO_WAIT},
|
|
|
|
|
{"dry-run", no_argument, NULL, OPT_DRY_RUN},
|
|
|
|
|
{"oneline", no_argument, NULL, OPT_ONELINE},
|
|
|
|
|
{"timeout", required_argument, NULL, 't'},
|
2013-03-15 16:14:28 -07:00
|
|
|
|
{"retry", no_argument, NULL, OPT_RETRY},
|
2011-05-04 13:49:42 -07:00
|
|
|
|
{"help", no_argument, NULL, 'h'},
|
|
|
|
|
{"version", no_argument, NULL, 'V'},
|
2010-01-04 19:15:22 -08:00
|
|
|
|
VLOG_LONG_OPTIONS,
|
2011-02-08 16:10:34 -08:00
|
|
|
|
TABLE_LONG_OPTIONS,
|
2011-05-10 09:17:37 -07:00
|
|
|
|
STREAM_SSL_LONG_OPTIONS,
|
2011-05-04 13:49:42 -07:00
|
|
|
|
{"peer-ca-cert", required_argument, NULL, OPT_PEER_CA_CERT},
|
|
|
|
|
{NULL, 0, NULL, 0},
|
2009-12-08 17:18:12 -08:00
|
|
|
|
};
|
2012-12-10 14:24:36 -08:00
|
|
|
|
const int n_global_long_options = ARRAY_SIZE(global_long_options) - 1;
|
2010-08-16 15:54:47 -07:00
|
|
|
|
char *tmp, *short_options;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2012-12-10 14:24:36 -08:00
|
|
|
|
const struct vsctl_command_syntax *p;
|
|
|
|
|
struct option *options, *o;
|
|
|
|
|
size_t allocated_options;
|
|
|
|
|
size_t n_options;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
tmp = long_options_to_short_options(global_long_options);
|
2010-08-16 15:54:47 -07:00
|
|
|
|
short_options = xasprintf("+%s", tmp);
|
|
|
|
|
free(tmp);
|
2009-12-14 10:13:36 -08:00
|
|
|
|
|
2012-12-10 14:24:36 -08:00
|
|
|
|
/* We want to parse both global and command-specific options here, but
|
|
|
|
|
* getopt_long() isn't too convenient for the job. We copy our global
|
|
|
|
|
* options into a dynamic array, then append all of the command-specific
|
|
|
|
|
* options. */
|
|
|
|
|
options = xmemdup(global_long_options, sizeof global_long_options);
|
|
|
|
|
allocated_options = ARRAY_SIZE(global_long_options);
|
|
|
|
|
n_options = n_global_long_options;
|
2013-07-19 10:04:47 -07:00
|
|
|
|
for (p = get_all_commands(); p->name; p++) {
|
2012-12-10 14:24:36 -08:00
|
|
|
|
if (p->options[0]) {
|
|
|
|
|
char *save_ptr = NULL;
|
|
|
|
|
char *name;
|
|
|
|
|
char *s;
|
|
|
|
|
|
|
|
|
|
s = xstrdup(p->options);
|
|
|
|
|
for (name = strtok_r(s, ",", &save_ptr); name != NULL;
|
|
|
|
|
name = strtok_r(NULL, ",", &save_ptr)) {
|
|
|
|
|
char *equals;
|
|
|
|
|
int has_arg;
|
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(name[0] == '-' && name[1] == '-' && name[2]);
|
2012-12-10 14:24:36 -08:00
|
|
|
|
name += 2;
|
|
|
|
|
|
|
|
|
|
equals = strchr(name, '=');
|
|
|
|
|
if (equals) {
|
|
|
|
|
has_arg = required_argument;
|
|
|
|
|
*equals = '\0';
|
|
|
|
|
} else {
|
|
|
|
|
has_arg = no_argument;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
o = find_option(name, options, n_options);
|
|
|
|
|
if (o) {
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(o - options >= n_global_long_options);
|
|
|
|
|
ovs_assert(o->has_arg == has_arg);
|
2012-12-10 14:24:36 -08:00
|
|
|
|
} else {
|
|
|
|
|
o = add_option(&options, &n_options, &allocated_options);
|
|
|
|
|
o->name = xstrdup(name);
|
|
|
|
|
o->has_arg = has_arg;
|
|
|
|
|
o->flag = NULL;
|
|
|
|
|
o->val = OPT_LOCAL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free(s);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
o = add_option(&options, &n_options, &allocated_options);
|
|
|
|
|
memset(o, 0, sizeof *o);
|
|
|
|
|
|
2011-02-08 16:10:34 -08:00
|
|
|
|
table_style.format = TF_LIST;
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
for (;;) {
|
2012-12-10 14:24:36 -08:00
|
|
|
|
int idx;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
int c;
|
|
|
|
|
|
2012-12-10 14:24:36 -08:00
|
|
|
|
c = getopt_long(argc, argv, short_options, options, &idx);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (c == -1) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
switch (c) {
|
|
|
|
|
case OPT_DB:
|
|
|
|
|
db = optarg;
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case OPT_ONELINE:
|
|
|
|
|
oneline = true;
|
|
|
|
|
break;
|
|
|
|
|
|
2009-12-09 13:28:48 -08:00
|
|
|
|
case OPT_NO_SYSLOG:
|
2010-07-16 10:53:14 -07:00
|
|
|
|
vlog_set_levels(&VLM_vsctl, VLF_SYSLOG, VLL_WARN);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
break;
|
|
|
|
|
|
2009-12-10 15:32:50 -08:00
|
|
|
|
case OPT_NO_WAIT:
|
2009-12-16 16:26:17 -08:00
|
|
|
|
wait_for_reload = false;
|
2009-12-10 15:32:50 -08:00
|
|
|
|
break;
|
|
|
|
|
|
2009-12-11 11:28:36 -08:00
|
|
|
|
case OPT_DRY_RUN:
|
|
|
|
|
dry_run = true;
|
|
|
|
|
break;
|
|
|
|
|
|
2012-12-10 14:24:36 -08:00
|
|
|
|
case OPT_LOCAL:
|
|
|
|
|
if (shash_find(local_options, options[idx].name)) {
|
|
|
|
|
vsctl_fatal("'%s' option specified multiple times",
|
|
|
|
|
options[idx].name);
|
|
|
|
|
}
|
|
|
|
|
shash_add_nocopy(local_options,
|
|
|
|
|
xasprintf("--%s", options[idx].name),
|
|
|
|
|
optarg ? xstrdup(optarg) : NULL);
|
|
|
|
|
break;
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
case 'h':
|
|
|
|
|
usage();
|
|
|
|
|
|
|
|
|
|
case 'V':
|
2011-08-02 12:16:44 -07:00
|
|
|
|
ovs_print_version(0, 0);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
|
|
2009-12-14 10:13:36 -08:00
|
|
|
|
case 't':
|
|
|
|
|
timeout = strtoul(optarg, NULL, 10);
|
2009-12-14 13:59:58 -08:00
|
|
|
|
if (timeout < 0) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("value %s on -t or --timeout is invalid",
|
|
|
|
|
optarg);
|
2009-12-14 10:13:36 -08:00
|
|
|
|
}
|
|
|
|
|
break;
|
|
|
|
|
|
2013-03-15 16:14:28 -07:00
|
|
|
|
case OPT_RETRY:
|
|
|
|
|
retry = true;
|
|
|
|
|
break;
|
|
|
|
|
|
2010-01-04 19:15:22 -08:00
|
|
|
|
VLOG_OPTION_HANDLERS
|
2011-02-08 16:10:34 -08:00
|
|
|
|
TABLE_OPTION_HANDLERS(&table_style)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-03-23 15:29:10 -07:00
|
|
|
|
STREAM_SSL_OPTION_HANDLERS
|
|
|
|
|
|
|
|
|
|
case OPT_PEER_CA_CERT:
|
|
|
|
|
stream_ssl_set_peer_ca_cert_file(optarg);
|
|
|
|
|
break;
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
case '?':
|
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
|
|
|
|
|
|
default:
|
|
|
|
|
abort();
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-08-16 15:54:47 -07:00
|
|
|
|
free(short_options);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
if (!db) {
|
|
|
|
|
db = default_db();
|
|
|
|
|
}
|
2012-12-10 14:24:36 -08:00
|
|
|
|
|
|
|
|
|
for (i = n_global_long_options; options[i].name; i++) {
|
|
|
|
|
free(CONST_CAST(char *, options[i].name));
|
|
|
|
|
}
|
|
|
|
|
free(options);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
static struct vsctl_command *
|
2012-12-10 14:24:36 -08:00
|
|
|
|
parse_commands(int argc, char *argv[], struct shash *local_options,
|
|
|
|
|
size_t *n_commandsp)
|
2010-01-28 16:09:26 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_command *commands;
|
|
|
|
|
size_t n_commands, allocated_commands;
|
|
|
|
|
int i, start;
|
|
|
|
|
|
|
|
|
|
commands = NULL;
|
|
|
|
|
n_commands = allocated_commands = 0;
|
|
|
|
|
|
|
|
|
|
for (start = i = 0; i <= argc; i++) {
|
|
|
|
|
if (i == argc || !strcmp(argv[i], "--")) {
|
|
|
|
|
if (i > start) {
|
|
|
|
|
if (n_commands >= allocated_commands) {
|
|
|
|
|
struct vsctl_command *c;
|
|
|
|
|
|
|
|
|
|
commands = x2nrealloc(commands, &allocated_commands,
|
|
|
|
|
sizeof *commands);
|
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
shash_moved(&c->options);
|
|
|
|
|
}
|
|
|
|
|
}
|
2012-12-10 14:24:36 -08:00
|
|
|
|
parse_command(i - start, &argv[start], local_options,
|
2010-01-28 16:09:26 -08:00
|
|
|
|
&commands[n_commands++]);
|
2012-12-10 14:24:36 -08:00
|
|
|
|
} else if (!shash_is_empty(local_options)) {
|
|
|
|
|
vsctl_fatal("missing command name (use --help for help)");
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
start = i + 1;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (!n_commands) {
|
|
|
|
|
vsctl_fatal("missing command name (use --help for help)");
|
|
|
|
|
}
|
|
|
|
|
*n_commandsp = n_commands;
|
|
|
|
|
return commands;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2012-12-10 14:24:36 -08:00
|
|
|
|
parse_command(int argc, char *argv[], struct shash *local_options,
|
|
|
|
|
struct vsctl_command *command)
|
2010-01-28 16:09:26 -08:00
|
|
|
|
{
|
|
|
|
|
const struct vsctl_command_syntax *p;
|
2010-09-01 13:41:09 -07:00
|
|
|
|
struct shash_node *node;
|
|
|
|
|
int n_arg;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
shash_init(&command->options);
|
2012-12-10 14:24:36 -08:00
|
|
|
|
shash_swap(local_options, &command->options);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
for (i = 0; i < argc; i++) {
|
2010-05-18 12:46:56 -07:00
|
|
|
|
const char *option = argv[i];
|
|
|
|
|
const char *equals;
|
|
|
|
|
char *key, *value;
|
|
|
|
|
|
|
|
|
|
if (option[0] != '-') {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
break;
|
|
|
|
|
}
|
2010-05-18 12:46:56 -07:00
|
|
|
|
|
|
|
|
|
equals = strchr(option, '=');
|
|
|
|
|
if (equals) {
|
|
|
|
|
key = xmemdup0(option, equals - option);
|
|
|
|
|
value = xstrdup(equals + 1);
|
|
|
|
|
} else {
|
|
|
|
|
key = xstrdup(option);
|
|
|
|
|
value = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (shash_find(&command->options, key)) {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
vsctl_fatal("'%s' option specified multiple times", argv[i]);
|
|
|
|
|
}
|
2010-05-18 12:46:56 -07:00
|
|
|
|
shash_add_nocopy(&command->options, key, value);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
if (i == argc) {
|
2012-12-10 14:24:36 -08:00
|
|
|
|
vsctl_fatal("missing command name (use --help for help)");
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-09-01 13:41:09 -07:00
|
|
|
|
p = find_command(argv[i]);
|
|
|
|
|
if (!p) {
|
|
|
|
|
vsctl_fatal("unknown command '%s'; use --help for help", argv[i]);
|
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
2010-09-01 13:41:09 -07:00
|
|
|
|
SHASH_FOR_EACH (node, &command->options) {
|
|
|
|
|
const char *s = strstr(p->options, node->name);
|
|
|
|
|
int end = s ? s[strlen(node->name)] : EOF;
|
2010-05-18 12:46:56 -07:00
|
|
|
|
|
2010-09-01 13:41:09 -07:00
|
|
|
|
if (end != '=' && end != ',' && end != ' ' && end != '\0') {
|
|
|
|
|
vsctl_fatal("'%s' command has no '%s' option",
|
|
|
|
|
argv[i], node->name);
|
|
|
|
|
}
|
|
|
|
|
if ((end == '=') != (node->data != NULL)) {
|
|
|
|
|
if (end == '=') {
|
|
|
|
|
vsctl_fatal("missing argument to '%s' option on '%s' "
|
|
|
|
|
"command", node->name, argv[i]);
|
|
|
|
|
} else {
|
|
|
|
|
vsctl_fatal("'%s' option on '%s' does not accept an "
|
|
|
|
|
"argument", node->name, argv[i]);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
2010-09-01 13:41:09 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
2010-09-01 13:41:09 -07:00
|
|
|
|
n_arg = argc - i - 1;
|
|
|
|
|
if (n_arg < p->min_args) {
|
|
|
|
|
vsctl_fatal("'%s' command requires at least %d arguments",
|
|
|
|
|
p->name, p->min_args);
|
|
|
|
|
} else if (n_arg > p->max_args) {
|
|
|
|
|
int j;
|
|
|
|
|
|
|
|
|
|
for (j = i + 1; j < argc; j++) {
|
|
|
|
|
if (argv[j][0] == '-') {
|
|
|
|
|
vsctl_fatal("'%s' command takes at most %d arguments "
|
|
|
|
|
"(note that options must precede command "
|
|
|
|
|
"names and follow a \"--\" argument)",
|
2010-01-28 16:09:26 -08:00
|
|
|
|
p->name, p->max_args);
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-09-01 13:41:09 -07:00
|
|
|
|
|
|
|
|
|
vsctl_fatal("'%s' command takes at most %d arguments",
|
|
|
|
|
p->name, p->max_args);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
command->syntax = p;
|
|
|
|
|
command->argc = n_arg + 1;
|
|
|
|
|
command->argv = &argv[i];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Returns the "struct vsctl_command_syntax" for a given command 'name', or a
|
|
|
|
|
* null pointer if there is none. */
|
|
|
|
|
static const struct vsctl_command_syntax *
|
|
|
|
|
find_command(const char *name)
|
|
|
|
|
{
|
|
|
|
|
static struct shash commands = SHASH_INITIALIZER(&commands);
|
|
|
|
|
|
|
|
|
|
if (shash_is_empty(&commands)) {
|
|
|
|
|
const struct vsctl_command_syntax *p;
|
|
|
|
|
|
2013-07-19 10:04:47 -07:00
|
|
|
|
for (p = get_all_commands(); p->name; p++) {
|
2010-09-01 13:41:09 -07:00
|
|
|
|
shash_add_assert(&commands, p->name, p);
|
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-09-01 13:41:09 -07:00
|
|
|
|
return shash_find_data(&commands, name);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
vsctl_fatal(const char *format, ...)
|
|
|
|
|
{
|
|
|
|
|
char *message;
|
|
|
|
|
va_list args;
|
|
|
|
|
|
|
|
|
|
va_start(args, format);
|
|
|
|
|
message = xvasprintf(format, args);
|
|
|
|
|
va_end(args);
|
|
|
|
|
|
2011-07-28 10:19:42 -07:00
|
|
|
|
vlog_set_levels(&VLM_vsctl, VLF_CONSOLE, VLL_OFF);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
VLOG_ERR("%s", message);
|
2010-02-02 14:25:11 -08:00
|
|
|
|
ovs_error(0, "%s", message);
|
2010-02-02 14:26:17 -08:00
|
|
|
|
vsctl_exit(EXIT_FAILURE);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Frees the current transaction and the underlying IDL and then calls
|
|
|
|
|
* exit(status).
|
|
|
|
|
*
|
|
|
|
|
* Freeing the transaction and the IDL is not strictly necessary, but it makes
|
|
|
|
|
* for a clean memory leak report from valgrind in the normal case. That makes
|
|
|
|
|
* it easier to notice real memory leaks. */
|
|
|
|
|
static void
|
|
|
|
|
vsctl_exit(int status)
|
|
|
|
|
{
|
|
|
|
|
if (the_idl_txn) {
|
|
|
|
|
ovsdb_idl_txn_abort(the_idl_txn);
|
|
|
|
|
ovsdb_idl_txn_destroy(the_idl_txn);
|
|
|
|
|
}
|
|
|
|
|
ovsdb_idl_destroy(the_idl);
|
|
|
|
|
exit(status);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
|
|
|
|
usage(void)
|
|
|
|
|
{
|
2010-01-27 13:49:19 -08:00
|
|
|
|
printf("\
|
|
|
|
|
%s: ovs-vswitchd management utility\n\
|
|
|
|
|
usage: %s [OPTIONS] COMMAND [ARG...]\n\
|
|
|
|
|
\n\
|
2011-02-10 09:34:42 -08:00
|
|
|
|
Open vSwitch commands:\n\
|
|
|
|
|
init initialize database, if not yet initialized\n\
|
2011-05-24 13:03:58 -07:00
|
|
|
|
show print overview of database contents\n\
|
2011-02-10 09:34:42 -08:00
|
|
|
|
emer-reset reset configuration to clean state\n\
|
|
|
|
|
\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
Bridge commands:\n\
|
|
|
|
|
add-br BRIDGE create a new bridge named BRIDGE\n\
|
|
|
|
|
add-br BRIDGE PARENT VLAN create new fake BRIDGE in PARENT on VLAN\n\
|
|
|
|
|
del-br BRIDGE delete BRIDGE and all of its ports\n\
|
|
|
|
|
list-br print the names of all the bridges\n\
|
2012-03-12 15:49:17 -07:00
|
|
|
|
br-exists BRIDGE exit 2 if BRIDGE does not exist\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
br-to-vlan BRIDGE print the VLAN which BRIDGE is on\n\
|
|
|
|
|
br-to-parent BRIDGE print the parent of BRIDGE\n\
|
|
|
|
|
br-set-external-id BRIDGE KEY VALUE set KEY on BRIDGE to VALUE\n\
|
|
|
|
|
br-set-external-id BRIDGE KEY unset KEY on BRIDGE\n\
|
|
|
|
|
br-get-external-id BRIDGE KEY print value of KEY on BRIDGE\n\
|
|
|
|
|
br-get-external-id BRIDGE list key-value pairs on BRIDGE\n\
|
|
|
|
|
\n\
|
2011-02-10 09:34:42 -08:00
|
|
|
|
Port commands (a bond is considered to be a single port):\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
list-ports BRIDGE print the names of all the ports on BRIDGE\n\
|
|
|
|
|
add-port BRIDGE PORT add network device PORT to BRIDGE\n\
|
|
|
|
|
add-bond BRIDGE PORT IFACE... add bonded port PORT in BRIDGE from IFACES\n\
|
|
|
|
|
del-port [BRIDGE] PORT delete PORT (which may be bonded) from BRIDGE\n\
|
|
|
|
|
port-to-br PORT print name of bridge that contains PORT\n\
|
|
|
|
|
\n\
|
|
|
|
|
Interface commands (a bond consists of multiple interfaces):\n\
|
|
|
|
|
list-ifaces BRIDGE print the names of all interfaces on BRIDGE\n\
|
|
|
|
|
iface-to-br IFACE print name of bridge that contains IFACE\n\
|
|
|
|
|
\n\
|
|
|
|
|
Controller commands:\n\
|
2011-09-15 13:30:18 -07:00
|
|
|
|
get-controller BRIDGE print the controllers for BRIDGE\n\
|
|
|
|
|
del-controller BRIDGE delete the controllers for BRIDGE\n\
|
|
|
|
|
set-controller BRIDGE TARGET... set the controllers for BRIDGE\n\
|
2010-07-15 14:53:36 -07:00
|
|
|
|
get-fail-mode BRIDGE print the fail-mode for BRIDGE\n\
|
|
|
|
|
del-fail-mode BRIDGE delete the fail-mode for BRIDGE\n\
|
|
|
|
|
set-fail-mode BRIDGE MODE set the fail-mode for BRIDGE to MODE\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
\n\
|
2011-02-04 13:30:02 -08:00
|
|
|
|
Manager commands:\n\
|
2011-09-15 13:30:18 -07:00
|
|
|
|
get-manager print the managers\n\
|
|
|
|
|
del-manager delete the managers\n\
|
|
|
|
|
set-manager TARGET... set the list of managers to TARGET...\n\
|
2011-02-04 13:30:02 -08:00
|
|
|
|
\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
SSL commands:\n\
|
|
|
|
|
get-ssl print the SSL configuration\n\
|
|
|
|
|
del-ssl delete the SSL configuration\n\
|
|
|
|
|
set-ssl PRIV-KEY CERT CA-CERT set the SSL configuration\n\
|
|
|
|
|
\n\
|
2010-04-30 15:06:51 -07:00
|
|
|
|
Switch commands:\n\
|
|
|
|
|
emer-reset reset switch to known good state\n\
|
|
|
|
|
\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
Database commands:\n\
|
|
|
|
|
list TBL [REC] list RECord (or all records) in TBL\n\
|
2011-02-08 10:21:59 -08:00
|
|
|
|
find TBL CONDITION... list records satisfying CONDITION in TBL\n\
|
2010-07-14 16:36:42 -07:00
|
|
|
|
get TBL REC COL[:KEY] print values of COLumns in RECord in TBL\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
set TBL REC COL[:KEY]=VALUE set COLumn values in RECord in TBL\n\
|
|
|
|
|
add TBL REC COL [KEY=]VALUE add (KEY=)VALUE to COLumn in RECord in TBL\n\
|
|
|
|
|
remove TBL REC COL [KEY=]VALUE remove (KEY=)VALUE from COLumn\n\
|
|
|
|
|
clear TBL REC COL clear values from COLumn in RECord in TBL\n\
|
|
|
|
|
create TBL COL[:KEY]=VALUE create and initialize new record\n\
|
2010-07-14 16:36:42 -07:00
|
|
|
|
destroy TBL REC delete RECord from TBL\n\
|
2010-06-29 09:54:10 -07:00
|
|
|
|
wait-until TBL REC [COL[:KEY]=VALUE] wait until condition is true\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
Potentially unsafe database commands require --force option.\n\
|
|
|
|
|
\n\
|
|
|
|
|
Options:\n\
|
|
|
|
|
--db=DATABASE connect to DATABASE\n\
|
|
|
|
|
(default: %s)\n\
|
2011-02-10 09:34:42 -08:00
|
|
|
|
--no-wait do not wait for ovs-vswitchd to reconfigure\n\
|
2013-03-15 16:14:28 -07:00
|
|
|
|
--retry keep trying to connect to server forever\n\
|
2011-02-10 09:34:42 -08:00
|
|
|
|
-t, --timeout=SECS wait at most SECS seconds for ovs-vswitchd\n\
|
|
|
|
|
--dry-run do not commit changes to database\n\
|
2010-01-27 13:49:19 -08:00
|
|
|
|
--oneline print exactly one line of output per command\n",
|
|
|
|
|
program_name, program_name, default_db());
|
2009-12-08 17:18:12 -08:00
|
|
|
|
vlog_usage();
|
2011-02-10 09:34:42 -08:00
|
|
|
|
printf("\
|
|
|
|
|
--no-syslog equivalent to --verbose=vsctl:syslog:warn\n");
|
|
|
|
|
stream_usage("database", true, true, false);
|
2010-01-27 13:49:19 -08:00
|
|
|
|
printf("\n\
|
|
|
|
|
Other options:\n\
|
|
|
|
|
-h, --help display this help message\n\
|
|
|
|
|
-V, --version display version information\n");
|
2009-12-08 17:18:12 -08:00
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static char *
|
|
|
|
|
default_db(void)
|
|
|
|
|
{
|
|
|
|
|
static char *def;
|
|
|
|
|
if (!def) {
|
2010-11-29 12:28:26 -08:00
|
|
|
|
def = xasprintf("unix:%s/db.sock", ovs_rundir());
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
return def;
|
|
|
|
|
}
|
2010-09-01 13:42:33 -07:00
|
|
|
|
|
|
|
|
|
/* Returns true if it looks like this set of arguments might modify the
|
|
|
|
|
* database, otherwise false. (Not very smart, so it's prone to false
|
|
|
|
|
* positives.) */
|
|
|
|
|
static bool
|
|
|
|
|
might_write_to_db(char **argv)
|
|
|
|
|
{
|
|
|
|
|
for (; *argv; argv++) {
|
|
|
|
|
const struct vsctl_command_syntax *p = find_command(*argv);
|
|
|
|
|
if (p && p->mode == RW) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return false;
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
struct vsctl_context {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
/* Read-only. */
|
2009-12-10 13:28:22 -08:00
|
|
|
|
int argc;
|
|
|
|
|
char **argv;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct shash options;
|
|
|
|
|
|
|
|
|
|
/* Modifiable state. */
|
|
|
|
|
struct ds output;
|
2011-02-08 16:10:34 -08:00
|
|
|
|
struct table *table;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
struct ovsdb_idl *idl;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct ovsdb_idl_txn *txn;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
struct ovsdb_symbol_table *symtab;
|
2009-12-10 13:28:22 -08:00
|
|
|
|
const struct ovsrec_open_vswitch *ovs;
|
2010-10-22 14:46:30 -07:00
|
|
|
|
bool verified_ports;
|
2010-06-24 11:01:53 -07:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
/* A cache of the contents of the database.
|
|
|
|
|
*
|
|
|
|
|
* A command that needs to use any of this information must first call
|
|
|
|
|
* vsctl_context_populate_cache(). A command that changes anything that
|
|
|
|
|
* could invalidate the cache must either call
|
|
|
|
|
* vsctl_context_invalidate_cache() or manually update the cache to
|
|
|
|
|
* maintain its correctness. */
|
|
|
|
|
bool cache_valid;
|
|
|
|
|
struct shash bridges; /* Maps from bridge name to struct vsctl_bridge. */
|
|
|
|
|
struct shash ports; /* Maps from port name to struct vsctl_port. */
|
|
|
|
|
struct shash ifaces; /* Maps from port name to struct vsctl_iface. */
|
|
|
|
|
|
2010-06-24 11:01:53 -07:00
|
|
|
|
/* A command may set this member to true if some prerequisite is not met
|
|
|
|
|
* and the caller should wait for something to change and then retry. */
|
|
|
|
|
bool try_again;
|
2009-12-10 13:28:22 -08:00
|
|
|
|
};
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge {
|
|
|
|
|
struct ovsrec_bridge *br_cfg;
|
|
|
|
|
char *name;
|
2012-04-17 16:56:21 -07:00
|
|
|
|
struct list ports; /* Contains "struct vsctl_port"s. */
|
2012-03-16 13:12:54 -07:00
|
|
|
|
|
|
|
|
|
/* VLAN ("fake") bridge support.
|
|
|
|
|
*
|
|
|
|
|
* Use 'parent != NULL' to detect a fake bridge, because 'vlan' can be 0
|
|
|
|
|
* in either case. */
|
2012-04-17 16:56:21 -07:00
|
|
|
|
struct hmap children; /* VLAN bridges indexed by 'vlan'. */
|
|
|
|
|
struct hmap_node children_node; /* Node in parent's 'children' hmap. */
|
2012-03-16 13:12:54 -07:00
|
|
|
|
struct vsctl_bridge *parent; /* Real bridge, or NULL. */
|
|
|
|
|
int vlan; /* VLAN VID (0...4095), or 0. */
|
2009-12-08 17:18:12 -08:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct vsctl_port {
|
2012-04-17 16:56:21 -07:00
|
|
|
|
struct list ports_node; /* In struct vsctl_bridge's 'ports' list. */
|
|
|
|
|
struct list ifaces; /* Contains "struct vsctl_iface"s. */
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct ovsrec_port *port_cfg;
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct vsctl_iface {
|
2012-04-17 16:56:21 -07:00
|
|
|
|
struct list ifaces_node; /* In struct vsctl_port's 'ifaces' list. */
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct ovsrec_interface *iface_cfg;
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
};
|
|
|
|
|
|
2010-02-09 12:13:46 -08:00
|
|
|
|
static char *
|
|
|
|
|
vsctl_context_to_string(const struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const struct shash_node *node;
|
|
|
|
|
struct svec words;
|
|
|
|
|
char *s;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
svec_init(&words);
|
|
|
|
|
SHASH_FOR_EACH (node, &ctx->options) {
|
|
|
|
|
svec_add(&words, node->name);
|
|
|
|
|
}
|
|
|
|
|
for (i = 0; i < ctx->argc; i++) {
|
|
|
|
|
svec_add(&words, ctx->argv[i]);
|
|
|
|
|
}
|
|
|
|
|
svec_terminate(&words);
|
|
|
|
|
|
|
|
|
|
s = process_escape_args(words.names);
|
|
|
|
|
|
|
|
|
|
svec_destroy(&words);
|
|
|
|
|
|
|
|
|
|
return s;
|
|
|
|
|
}
|
|
|
|
|
|
2010-10-22 14:46:30 -07:00
|
|
|
|
static void
|
|
|
|
|
verify_ports(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
if (!ctx->verified_ports) {
|
|
|
|
|
const struct ovsrec_bridge *bridge;
|
|
|
|
|
const struct ovsrec_port *port;
|
|
|
|
|
|
|
|
|
|
ovsrec_open_vswitch_verify_bridges(ctx->ovs);
|
|
|
|
|
OVSREC_BRIDGE_FOR_EACH (bridge, ctx->idl) {
|
|
|
|
|
ovsrec_bridge_verify_ports(bridge);
|
|
|
|
|
}
|
|
|
|
|
OVSREC_PORT_FOR_EACH (port, ctx->idl) {
|
|
|
|
|
ovsrec_port_verify_interfaces(port);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ctx->verified_ports = true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static struct vsctl_bridge *
|
2012-04-17 16:56:21 -07:00
|
|
|
|
add_bridge_to_cache(struct vsctl_context *ctx,
|
|
|
|
|
struct ovsrec_bridge *br_cfg, const char *name,
|
|
|
|
|
struct vsctl_bridge *parent, int vlan)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *br = xmalloc(sizeof *br);
|
|
|
|
|
br->br_cfg = br_cfg;
|
|
|
|
|
br->name = xstrdup(name);
|
2012-04-17 16:56:21 -07:00
|
|
|
|
list_init(&br->ports);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
br->parent = parent;
|
|
|
|
|
br->vlan = vlan;
|
2012-04-17 16:56:21 -07:00
|
|
|
|
hmap_init(&br->children);
|
|
|
|
|
if (parent) {
|
|
|
|
|
hmap_insert(&parent->children, &br->children_node, hash_int(vlan, 0));
|
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
shash_add(&ctx->bridges, br->name, br);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
return br;
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 16:56:21 -07:00
|
|
|
|
static void
|
|
|
|
|
ovs_delete_bridge(const struct ovsrec_open_vswitch *ovs,
|
|
|
|
|
struct ovsrec_bridge *bridge)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_bridge **bridges;
|
|
|
|
|
size_t i, n;
|
|
|
|
|
|
|
|
|
|
bridges = xmalloc(sizeof *ovs->bridges * ovs->n_bridges);
|
|
|
|
|
for (i = n = 0; i < ovs->n_bridges; i++) {
|
|
|
|
|
if (ovs->bridges[i] != bridge) {
|
|
|
|
|
bridges[n++] = ovs->bridges[i];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ovsrec_open_vswitch_set_bridges(ovs, bridges, n);
|
|
|
|
|
free(bridges);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
del_cached_bridge(struct vsctl_context *ctx, struct vsctl_bridge *br)
|
|
|
|
|
{
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(list_is_empty(&br->ports));
|
|
|
|
|
ovs_assert(hmap_is_empty(&br->children));
|
2012-04-17 16:56:21 -07:00
|
|
|
|
if (br->parent) {
|
|
|
|
|
hmap_remove(&br->parent->children, &br->children_node);
|
|
|
|
|
}
|
|
|
|
|
if (br->br_cfg) {
|
|
|
|
|
ovsrec_bridge_delete(br->br_cfg);
|
|
|
|
|
ovs_delete_bridge(ctx->ovs, br->br_cfg);
|
|
|
|
|
}
|
|
|
|
|
shash_find_and_delete(&ctx->bridges, br->name);
|
|
|
|
|
hmap_destroy(&br->children);
|
|
|
|
|
free(br->name);
|
|
|
|
|
free(br);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static bool
|
|
|
|
|
port_is_fake_bridge(const struct ovsrec_port *port_cfg)
|
|
|
|
|
{
|
|
|
|
|
return (port_cfg->fake_bridge
|
|
|
|
|
&& port_cfg->tag
|
2012-03-16 13:12:54 -07:00
|
|
|
|
&& *port_cfg->tag >= 0 && *port_cfg->tag <= 4095);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct vsctl_bridge *
|
2012-04-17 16:56:21 -07:00
|
|
|
|
find_vlan_bridge(struct vsctl_bridge *parent, int vlan)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2012-04-17 16:56:21 -07:00
|
|
|
|
struct vsctl_bridge *child;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2012-04-17 16:56:21 -07:00
|
|
|
|
HMAP_FOR_EACH_IN_BUCKET (child, children_node, hash_int(vlan, 0),
|
|
|
|
|
&parent->children) {
|
|
|
|
|
if (child->vlan == vlan) {
|
|
|
|
|
return child;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 16:56:21 -07:00
|
|
|
|
static struct vsctl_port *
|
|
|
|
|
add_port_to_cache(struct vsctl_context *ctx, struct vsctl_bridge *parent,
|
|
|
|
|
struct ovsrec_port *port_cfg)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
|
|
|
|
|
if (port_cfg->tag
|
|
|
|
|
&& *port_cfg->tag >= 0 && *port_cfg->tag <= 4095) {
|
|
|
|
|
struct vsctl_bridge *vlan_bridge;
|
|
|
|
|
|
|
|
|
|
vlan_bridge = find_vlan_bridge(parent, *port_cfg->tag);
|
|
|
|
|
if (vlan_bridge) {
|
|
|
|
|
parent = vlan_bridge;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
port = xmalloc(sizeof *port);
|
|
|
|
|
list_push_back(&parent->ports, &port->ports_node);
|
|
|
|
|
list_init(&port->ifaces);
|
|
|
|
|
port->port_cfg = port_cfg;
|
|
|
|
|
port->bridge = parent;
|
|
|
|
|
shash_add(&ctx->ports, port_cfg->name, port);
|
|
|
|
|
|
|
|
|
|
return port;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
del_cached_port(struct vsctl_context *ctx, struct vsctl_port *port)
|
|
|
|
|
{
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(list_is_empty(&port->ifaces));
|
2012-04-17 16:56:21 -07:00
|
|
|
|
list_remove(&port->ports_node);
|
|
|
|
|
shash_find_and_delete(&ctx->ports, port->port_cfg->name);
|
|
|
|
|
ovsrec_port_delete(port->port_cfg);
|
|
|
|
|
free(port);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct vsctl_iface *
|
|
|
|
|
add_iface_to_cache(struct vsctl_context *ctx, struct vsctl_port *parent,
|
|
|
|
|
struct ovsrec_interface *iface_cfg)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
|
|
|
|
|
iface = xmalloc(sizeof *iface);
|
|
|
|
|
list_push_back(&parent->ifaces, &iface->ifaces_node);
|
|
|
|
|
iface->iface_cfg = iface_cfg;
|
|
|
|
|
iface->port = parent;
|
|
|
|
|
shash_add(&ctx->ifaces, iface_cfg->name, iface);
|
|
|
|
|
|
|
|
|
|
return iface;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
del_cached_iface(struct vsctl_context *ctx, struct vsctl_iface *iface)
|
|
|
|
|
{
|
|
|
|
|
list_remove(&iface->ifaces_node);
|
|
|
|
|
shash_find_and_delete(&ctx->ifaces, iface->iface_cfg->name);
|
|
|
|
|
ovsrec_interface_delete(iface->iface_cfg);
|
|
|
|
|
free(iface);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_invalidate_cache(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct shash_node *node;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
if (!ctx->cache_valid) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
ctx->cache_valid = false;
|
|
|
|
|
|
|
|
|
|
SHASH_FOR_EACH (node, &ctx->bridges) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge *bridge = node->data;
|
2012-04-17 16:56:21 -07:00
|
|
|
|
hmap_destroy(&bridge->children);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
free(bridge->name);
|
|
|
|
|
free(bridge);
|
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
shash_destroy(&ctx->bridges);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
shash_destroy_free_data(&ctx->ports);
|
|
|
|
|
shash_destroy_free_data(&ctx->ifaces);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_get_info(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_bridges);
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_name);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_controller);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_fail_mode);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_ports);
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_name);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_fake_bridge);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_tag);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_interfaces);
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_interface_col_name);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2010-10-22 11:22:38 -07:00
|
|
|
|
const struct ovsrec_open_vswitch *ovs = ctx->ovs;
|
2011-03-25 15:26:30 -07:00
|
|
|
|
struct sset bridges, ports;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
size_t i;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
if (ctx->cache_valid) {
|
|
|
|
|
/* Cache is already populated. */
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
ctx->cache_valid = true;
|
|
|
|
|
shash_init(&ctx->bridges);
|
|
|
|
|
shash_init(&ctx->ports);
|
|
|
|
|
shash_init(&ctx->ifaces);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2011-03-25 15:26:30 -07:00
|
|
|
|
sset_init(&bridges);
|
|
|
|
|
sset_init(&ports);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
for (i = 0; i < ovs->n_bridges; i++) {
|
|
|
|
|
struct ovsrec_bridge *br_cfg = ovs->bridges[i];
|
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
size_t j;
|
|
|
|
|
|
2011-03-25 15:26:30 -07:00
|
|
|
|
if (!sset_add(&bridges, br_cfg->name)) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
VLOG_WARN("%s: database contains duplicate bridge name",
|
|
|
|
|
br_cfg->name);
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2012-04-17 16:56:21 -07:00
|
|
|
|
br = add_bridge_to_cache(ctx, br_cfg, br_cfg->name, NULL, 0);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (!br) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (j = 0; j < br_cfg->n_ports; j++) {
|
|
|
|
|
struct ovsrec_port *port_cfg = br_cfg->ports[j];
|
|
|
|
|
|
2011-03-25 15:26:30 -07:00
|
|
|
|
if (!sset_add(&ports, port_cfg->name)) {
|
2011-07-08 12:31:55 -07:00
|
|
|
|
/* Duplicate port name. (We will warn about that later.) */
|
2009-12-08 17:18:12 -08:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (port_is_fake_bridge(port_cfg)
|
2011-03-25 15:26:30 -07:00
|
|
|
|
&& sset_add(&bridges, port_cfg->name)) {
|
2012-04-17 16:56:21 -07:00
|
|
|
|
add_bridge_to_cache(ctx, NULL, port_cfg->name, br,
|
|
|
|
|
*port_cfg->tag);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2011-03-25 15:26:30 -07:00
|
|
|
|
sset_destroy(&bridges);
|
|
|
|
|
sset_destroy(&ports);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2011-03-25 15:26:30 -07:00
|
|
|
|
sset_init(&bridges);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
for (i = 0; i < ovs->n_bridges; i++) {
|
|
|
|
|
struct ovsrec_bridge *br_cfg = ovs->bridges[i];
|
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
size_t j;
|
|
|
|
|
|
2011-03-25 15:26:30 -07:00
|
|
|
|
if (!sset_add(&bridges, br_cfg->name)) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
continue;
|
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
br = shash_find_data(&ctx->bridges, br_cfg->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
for (j = 0; j < br_cfg->n_ports; j++) {
|
|
|
|
|
struct ovsrec_port *port_cfg = br_cfg->ports[j];
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
size_t k;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
port = shash_find_data(&ctx->ports, port_cfg->name);
|
2011-07-08 12:31:55 -07:00
|
|
|
|
if (port) {
|
|
|
|
|
if (port_cfg == port->port_cfg) {
|
|
|
|
|
VLOG_WARN("%s: port is in multiple bridges (%s and %s)",
|
|
|
|
|
port_cfg->name, br->name, port->bridge->name);
|
|
|
|
|
} else {
|
|
|
|
|
/* Log as an error because this violates the database's
|
|
|
|
|
* uniqueness constraints, so the database server shouldn't
|
|
|
|
|
* have allowed it. */
|
|
|
|
|
VLOG_ERR("%s: database contains duplicate port name",
|
|
|
|
|
port_cfg->name);
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (port_is_fake_bridge(port_cfg)
|
2011-03-25 15:26:30 -07:00
|
|
|
|
&& !sset_add(&bridges, port_cfg->name)) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 16:56:21 -07:00
|
|
|
|
port = add_port_to_cache(ctx, br, port_cfg);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
for (k = 0; k < port_cfg->n_interfaces; k++) {
|
|
|
|
|
struct ovsrec_interface *iface_cfg = port_cfg->interfaces[k];
|
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
iface = shash_find_data(&ctx->ifaces, iface_cfg->name);
|
2011-07-08 12:31:55 -07:00
|
|
|
|
if (iface) {
|
|
|
|
|
if (iface_cfg == iface->iface_cfg) {
|
|
|
|
|
VLOG_WARN("%s: interface is in multiple ports "
|
|
|
|
|
"(%s and %s)",
|
|
|
|
|
iface_cfg->name,
|
|
|
|
|
iface->port->port_cfg->name,
|
|
|
|
|
port->port_cfg->name);
|
|
|
|
|
} else {
|
|
|
|
|
/* Log as an error because this violates the database's
|
|
|
|
|
* uniqueness constraints, so the database server
|
|
|
|
|
* shouldn't have allowed it. */
|
|
|
|
|
VLOG_ERR("%s: database contains duplicate interface "
|
|
|
|
|
"name", iface_cfg->name);
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 16:56:21 -07:00
|
|
|
|
add_iface_to_cache(ctx, port, iface_cfg);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2011-03-25 15:26:30 -07:00
|
|
|
|
sset_destroy(&bridges);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2012-04-17 17:07:00 -07:00
|
|
|
|
check_conflicts(struct vsctl_context *ctx, const char *name,
|
2009-12-08 17:18:12 -08:00
|
|
|
|
char *msg)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
verify_ports(ctx);
|
2010-10-22 14:46:30 -07:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
if (shash_find(&ctx->bridges, name)) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("%s because a bridge named %s already exists",
|
|
|
|
|
msg, name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
port = shash_find_data(&ctx->ports, name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (port) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("%s because a port named %s already exists on "
|
|
|
|
|
"bridge %s", msg, name, port->bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
iface = shash_find_data(&ctx->ifaces, name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (iface) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("%s because an interface named %s already exists "
|
|
|
|
|
"on bridge %s", msg, name, iface->port->bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free(msg);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct vsctl_bridge *
|
2012-04-17 17:07:00 -07:00
|
|
|
|
find_bridge(struct vsctl_context *ctx, const char *name, bool must_exist)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2012-04-17 17:07:00 -07:00
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(ctx->cache_valid);
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
|
|
|
|
br = shash_find_data(&ctx->bridges, name);
|
2009-12-10 13:42:12 -08:00
|
|
|
|
if (must_exist && !br) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("no bridge named %s", name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
ovsrec_open_vswitch_verify_bridges(ctx->ovs);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
return br;
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-17 16:05:55 -08:00
|
|
|
|
static struct vsctl_bridge *
|
2012-04-17 17:07:00 -07:00
|
|
|
|
find_real_bridge(struct vsctl_context *ctx, const char *name, bool must_exist)
|
2009-12-17 16:05:55 -08:00
|
|
|
|
{
|
2012-04-17 17:07:00 -07:00
|
|
|
|
struct vsctl_bridge *br = find_bridge(ctx, name, must_exist);
|
2009-12-17 16:05:55 -08:00
|
|
|
|
if (br && br->parent) {
|
|
|
|
|
vsctl_fatal("%s is a fake bridge", name);
|
|
|
|
|
}
|
|
|
|
|
return br;
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static struct vsctl_port *
|
2012-04-17 17:07:00 -07:00
|
|
|
|
find_port(struct vsctl_context *ctx, const char *name, bool must_exist)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2012-04-17 17:07:00 -07:00
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(ctx->cache_valid);
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
|
|
|
|
port = shash_find_data(&ctx->ports, name);
|
2009-12-10 14:07:33 -08:00
|
|
|
|
if (port && !strcmp(name, port->bridge->name)) {
|
2009-12-10 13:42:12 -08:00
|
|
|
|
port = NULL;
|
|
|
|
|
}
|
|
|
|
|
if (must_exist && !port) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("no port named %s", name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
verify_ports(ctx);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
return port;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct vsctl_iface *
|
2012-04-17 17:07:00 -07:00
|
|
|
|
find_iface(struct vsctl_context *ctx, const char *name, bool must_exist)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2012-04-17 17:07:00 -07:00
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(ctx->cache_valid);
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
|
|
|
|
iface = shash_find_data(&ctx->ifaces, name);
|
2009-12-10 14:07:33 -08:00
|
|
|
|
if (iface && !strcmp(name, iface->port->bridge->name)) {
|
2009-12-10 13:42:12 -08:00
|
|
|
|
iface = NULL;
|
|
|
|
|
}
|
|
|
|
|
if (must_exist && !iface) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("no interface named %s", name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
verify_ports(ctx);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
return iface;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
bridge_insert_port(struct ovsrec_bridge *br, struct ovsrec_port *port)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_port **ports;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
ports = xmalloc(sizeof *br->ports * (br->n_ports + 1));
|
|
|
|
|
for (i = 0; i < br->n_ports; i++) {
|
|
|
|
|
ports[i] = br->ports[i];
|
|
|
|
|
}
|
|
|
|
|
ports[br->n_ports] = port;
|
|
|
|
|
ovsrec_bridge_set_ports(br, ports, br->n_ports + 1);
|
|
|
|
|
free(ports);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
bridge_delete_port(struct ovsrec_bridge *br, struct ovsrec_port *port)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_port **ports;
|
|
|
|
|
size_t i, n;
|
|
|
|
|
|
|
|
|
|
ports = xmalloc(sizeof *br->ports * br->n_ports);
|
|
|
|
|
for (i = n = 0; i < br->n_ports; i++) {
|
|
|
|
|
if (br->ports[i] != port) {
|
|
|
|
|
ports[n++] = br->ports[i];
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ovsrec_bridge_set_ports(br, ports, n);
|
|
|
|
|
free(ports);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
ovs_insert_bridge(const struct ovsrec_open_vswitch *ovs,
|
|
|
|
|
struct ovsrec_bridge *bridge)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_bridge **bridges;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
bridges = xmalloc(sizeof *ovs->bridges * (ovs->n_bridges + 1));
|
|
|
|
|
for (i = 0; i < ovs->n_bridges; i++) {
|
|
|
|
|
bridges[i] = ovs->bridges[i];
|
|
|
|
|
}
|
|
|
|
|
bridges[ovs->n_bridges] = bridge;
|
|
|
|
|
ovsrec_open_vswitch_set_bridges(ovs, bridges, ovs->n_bridges + 1);
|
|
|
|
|
free(bridges);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-11 10:40:55 -08:00
|
|
|
|
static void
|
2010-02-11 11:11:23 -08:00
|
|
|
|
cmd_init(struct vsctl_context *ctx OVS_UNUSED)
|
2009-12-11 10:40:55 -08:00
|
|
|
|
{
|
|
|
|
|
}
|
|
|
|
|
|
2011-05-24 13:03:58 -07:00
|
|
|
|
struct cmd_show_table {
|
|
|
|
|
const struct ovsdb_idl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_column *name_column;
|
|
|
|
|
const struct ovsdb_idl_column *columns[3];
|
|
|
|
|
bool recurse;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static struct cmd_show_table cmd_show_tables[] = {
|
|
|
|
|
{&ovsrec_table_open_vswitch,
|
|
|
|
|
NULL,
|
|
|
|
|
{&ovsrec_open_vswitch_col_manager_options,
|
|
|
|
|
&ovsrec_open_vswitch_col_bridges,
|
|
|
|
|
&ovsrec_open_vswitch_col_ovs_version},
|
|
|
|
|
false},
|
|
|
|
|
|
|
|
|
|
{&ovsrec_table_bridge,
|
|
|
|
|
&ovsrec_bridge_col_name,
|
|
|
|
|
{&ovsrec_bridge_col_controller,
|
|
|
|
|
&ovsrec_bridge_col_fail_mode,
|
|
|
|
|
&ovsrec_bridge_col_ports},
|
|
|
|
|
false},
|
|
|
|
|
|
|
|
|
|
{&ovsrec_table_port,
|
|
|
|
|
&ovsrec_port_col_name,
|
|
|
|
|
{&ovsrec_port_col_tag,
|
|
|
|
|
&ovsrec_port_col_trunks,
|
|
|
|
|
&ovsrec_port_col_interfaces},
|
|
|
|
|
false},
|
|
|
|
|
|
|
|
|
|
{&ovsrec_table_interface,
|
|
|
|
|
&ovsrec_interface_col_name,
|
|
|
|
|
{&ovsrec_interface_col_type,
|
|
|
|
|
&ovsrec_interface_col_options,
|
|
|
|
|
NULL},
|
|
|
|
|
false},
|
|
|
|
|
|
|
|
|
|
{&ovsrec_table_controller,
|
|
|
|
|
&ovsrec_controller_col_target,
|
|
|
|
|
{&ovsrec_controller_col_is_connected,
|
|
|
|
|
NULL,
|
|
|
|
|
NULL},
|
|
|
|
|
false},
|
|
|
|
|
|
|
|
|
|
{&ovsrec_table_manager,
|
|
|
|
|
&ovsrec_manager_col_target,
|
|
|
|
|
{&ovsrec_manager_col_is_connected,
|
|
|
|
|
NULL,
|
|
|
|
|
NULL},
|
|
|
|
|
false},
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
pre_cmd_show(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct cmd_show_table *show;
|
|
|
|
|
|
|
|
|
|
for (show = cmd_show_tables;
|
|
|
|
|
show < &cmd_show_tables[ARRAY_SIZE(cmd_show_tables)];
|
|
|
|
|
show++) {
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_table(ctx->idl, show->table);
|
|
|
|
|
if (show->name_column) {
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, show->name_column);
|
|
|
|
|
}
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(show->columns); i++) {
|
|
|
|
|
const struct ovsdb_idl_column *column = show->columns[i];
|
|
|
|
|
if (column) {
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, column);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct cmd_show_table *
|
|
|
|
|
cmd_show_find_table_by_row(const struct ovsdb_idl_row *row)
|
|
|
|
|
{
|
|
|
|
|
struct cmd_show_table *show;
|
|
|
|
|
|
|
|
|
|
for (show = cmd_show_tables;
|
|
|
|
|
show < &cmd_show_tables[ARRAY_SIZE(cmd_show_tables)];
|
|
|
|
|
show++) {
|
|
|
|
|
if (show->table == row->table->class) {
|
|
|
|
|
return show;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct cmd_show_table *
|
|
|
|
|
cmd_show_find_table_by_name(const char *name)
|
|
|
|
|
{
|
|
|
|
|
struct cmd_show_table *show;
|
|
|
|
|
|
|
|
|
|
for (show = cmd_show_tables;
|
|
|
|
|
show < &cmd_show_tables[ARRAY_SIZE(cmd_show_tables)];
|
|
|
|
|
show++) {
|
|
|
|
|
if (!strcmp(show->table->name, name)) {
|
|
|
|
|
return show;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_show_row(struct vsctl_context *ctx, const struct ovsdb_idl_row *row,
|
|
|
|
|
int level)
|
|
|
|
|
{
|
|
|
|
|
struct cmd_show_table *show = cmd_show_find_table_by_row(row);
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
ds_put_char_multiple(&ctx->output, ' ', level * 4);
|
|
|
|
|
if (show && show->name_column) {
|
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
|
|
|
|
|
|
ds_put_format(&ctx->output, "%s ", show->table->name);
|
|
|
|
|
datum = ovsdb_idl_read(row, show->name_column);
|
|
|
|
|
ovsdb_datum_to_string(datum, &show->name_column->type, &ctx->output);
|
|
|
|
|
} else {
|
|
|
|
|
ds_put_format(&ctx->output, UUID_FMT, UUID_ARGS(&row->uuid));
|
|
|
|
|
}
|
|
|
|
|
ds_put_char(&ctx->output, '\n');
|
|
|
|
|
|
|
|
|
|
if (!show || show->recurse) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
show->recurse = true;
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(show->columns); i++) {
|
|
|
|
|
const struct ovsdb_idl_column *column = show->columns[i];
|
|
|
|
|
const struct ovsdb_datum *datum;
|
|
|
|
|
|
|
|
|
|
if (!column) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
datum = ovsdb_idl_read(row, column);
|
|
|
|
|
if (column->type.key.type == OVSDB_TYPE_UUID &&
|
|
|
|
|
column->type.key.u.uuid.refTableName) {
|
|
|
|
|
struct cmd_show_table *ref_show;
|
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
|
|
ref_show = cmd_show_find_table_by_name(
|
|
|
|
|
column->type.key.u.uuid.refTableName);
|
|
|
|
|
if (ref_show) {
|
|
|
|
|
for (j = 0; j < datum->n; j++) {
|
|
|
|
|
const struct ovsdb_idl_row *ref_row;
|
|
|
|
|
|
|
|
|
|
ref_row = ovsdb_idl_get_row_for_uuid(ctx->idl,
|
|
|
|
|
ref_show->table,
|
|
|
|
|
&datum->keys[j].uuid);
|
|
|
|
|
if (ref_row) {
|
|
|
|
|
cmd_show_row(ctx, ref_row, level + 1);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!ovsdb_datum_is_default(datum, &column->type)) {
|
|
|
|
|
ds_put_char_multiple(&ctx->output, ' ', (level + 1) * 4);
|
|
|
|
|
ds_put_format(&ctx->output, "%s: ", column->name);
|
|
|
|
|
ovsdb_datum_to_string(datum, &column->type, &ctx->output);
|
|
|
|
|
ds_put_char(&ctx->output, '\n');
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
show->recurse = false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_show(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
|
|
|
|
|
for (row = ovsdb_idl_first_row(ctx->idl, cmd_show_tables[0].table);
|
|
|
|
|
row; row = ovsdb_idl_next_row(row)) {
|
|
|
|
|
cmd_show_row(ctx, row, 0);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_emer_reset(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2011-02-02 00:08:12 -08:00
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_manager_options);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl);
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_controller);
|
2011-01-17 16:52:16 -08:00
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_fail_mode);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_mirrors);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_netflow);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_sflow);
|
2013-04-22 10:01:14 -07:00
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_ipfix);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_flood_vlans);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_other_config);
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_other_config);
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl,
|
|
|
|
|
&ovsrec_interface_col_ingress_policing_rate);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl,
|
|
|
|
|
&ovsrec_interface_col_ingress_policing_burst);
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-30 15:06:51 -07:00
|
|
|
|
static void
|
|
|
|
|
cmd_emer_reset(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl *idl = ctx->idl;
|
|
|
|
|
const struct ovsrec_bridge *br;
|
|
|
|
|
const struct ovsrec_port *port;
|
|
|
|
|
const struct ovsrec_interface *iface;
|
2011-03-16 15:06:37 -07:00
|
|
|
|
const struct ovsrec_mirror *mirror, *next_mirror;
|
|
|
|
|
const struct ovsrec_controller *ctrl, *next_ctrl;
|
|
|
|
|
const struct ovsrec_manager *mgr, *next_mgr;
|
|
|
|
|
const struct ovsrec_netflow *nf, *next_nf;
|
|
|
|
|
const struct ovsrec_ssl *ssl, *next_ssl;
|
|
|
|
|
const struct ovsrec_sflow *sflow, *next_sflow;
|
2013-04-22 10:01:14 -07:00
|
|
|
|
const struct ovsrec_ipfix *ipfix, *next_ipfix;
|
|
|
|
|
const struct ovsrec_flow_sample_collector_set *fscset, *next_fscset;
|
2010-04-30 15:06:51 -07:00
|
|
|
|
|
|
|
|
|
/* Reset the Open_vSwitch table. */
|
2011-02-02 00:08:12 -08:00
|
|
|
|
ovsrec_open_vswitch_set_manager_options(ctx->ovs, NULL, 0);
|
2010-04-30 15:06:51 -07:00
|
|
|
|
ovsrec_open_vswitch_set_ssl(ctx->ovs, NULL);
|
|
|
|
|
|
|
|
|
|
OVSREC_BRIDGE_FOR_EACH (br, idl) {
|
2012-05-22 01:53:07 -07:00
|
|
|
|
const char *hwaddr;
|
2010-04-30 15:06:51 -07:00
|
|
|
|
|
|
|
|
|
ovsrec_bridge_set_controller(br, NULL, 0);
|
2011-01-17 16:52:16 -08:00
|
|
|
|
ovsrec_bridge_set_fail_mode(br, NULL);
|
2010-04-30 15:06:51 -07:00
|
|
|
|
ovsrec_bridge_set_mirrors(br, NULL, 0);
|
|
|
|
|
ovsrec_bridge_set_netflow(br, NULL);
|
|
|
|
|
ovsrec_bridge_set_sflow(br, NULL);
|
2013-04-22 10:01:14 -07:00
|
|
|
|
ovsrec_bridge_set_ipfix(br, NULL);
|
2010-04-30 15:06:51 -07:00
|
|
|
|
ovsrec_bridge_set_flood_vlans(br, NULL, 0);
|
|
|
|
|
|
|
|
|
|
/* We only want to save the "hwaddr" key from other_config. */
|
2012-05-22 01:53:07 -07:00
|
|
|
|
hwaddr = smap_get(&br->other_config, "hwaddr");
|
|
|
|
|
if (hwaddr) {
|
|
|
|
|
struct smap smap = SMAP_INITIALIZER(&smap);
|
|
|
|
|
smap_add(&smap, "hwaddr", hwaddr);
|
|
|
|
|
ovsrec_bridge_set_other_config(br, &smap);
|
|
|
|
|
smap_destroy(&smap);
|
2010-04-30 15:06:51 -07:00
|
|
|
|
} else {
|
2012-05-22 01:53:07 -07:00
|
|
|
|
ovsrec_bridge_set_other_config(br, NULL);
|
2010-04-30 15:06:51 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_PORT_FOR_EACH (port, idl) {
|
2012-05-22 01:53:07 -07:00
|
|
|
|
ovsrec_port_set_other_config(port, NULL);
|
2010-04-30 15:06:51 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_INTERFACE_FOR_EACH (iface, idl) {
|
|
|
|
|
/* xxx What do we do about gre/patch devices created by mgr? */
|
|
|
|
|
|
|
|
|
|
ovsrec_interface_set_ingress_policing_rate(iface, 0);
|
|
|
|
|
ovsrec_interface_set_ingress_policing_burst(iface, 0);
|
|
|
|
|
}
|
2011-03-16 15:06:37 -07:00
|
|
|
|
|
|
|
|
|
OVSREC_MIRROR_FOR_EACH_SAFE (mirror, next_mirror, idl) {
|
|
|
|
|
ovsrec_mirror_delete(mirror);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_CONTROLLER_FOR_EACH_SAFE (ctrl, next_ctrl, idl) {
|
|
|
|
|
ovsrec_controller_delete(ctrl);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_MANAGER_FOR_EACH_SAFE (mgr, next_mgr, idl) {
|
|
|
|
|
ovsrec_manager_delete(mgr);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_NETFLOW_FOR_EACH_SAFE (nf, next_nf, idl) {
|
|
|
|
|
ovsrec_netflow_delete(nf);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_SSL_FOR_EACH_SAFE (ssl, next_ssl, idl) {
|
|
|
|
|
ovsrec_ssl_delete(ssl);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_SFLOW_FOR_EACH_SAFE (sflow, next_sflow, idl) {
|
|
|
|
|
ovsrec_sflow_delete(sflow);
|
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
2013-04-22 10:01:14 -07:00
|
|
|
|
OVSREC_IPFIX_FOR_EACH_SAFE (ipfix, next_ipfix, idl) {
|
|
|
|
|
ovsrec_ipfix_delete(ipfix);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OVSREC_FLOW_SAMPLE_COLLECTOR_SET_FOR_EACH_SAFE (fscset, next_fscset, idl) {
|
|
|
|
|
ovsrec_flow_sample_collector_set_delete(fscset);
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_invalidate_cache(ctx);
|
2010-04-30 15:06:51 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_add_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2011-05-04 13:49:42 -07:00
|
|
|
|
bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL;
|
2010-02-10 11:21:56 -08:00
|
|
|
|
const char *br_name, *parent_name;
|
|
|
|
|
int vlan;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-02-09 11:03:14 -08:00
|
|
|
|
br_name = ctx->argv[1];
|
|
|
|
|
if (ctx->argc == 2) {
|
|
|
|
|
parent_name = NULL;
|
|
|
|
|
vlan = 0;
|
|
|
|
|
} else if (ctx->argc == 4) {
|
|
|
|
|
parent_name = ctx->argv[2];
|
|
|
|
|
vlan = atoi(ctx->argv[3]);
|
2012-03-16 13:12:54 -07:00
|
|
|
|
if (vlan < 0 || vlan > 4095) {
|
|
|
|
|
vsctl_fatal("%s: vlan must be between 0 and 4095", ctx->argv[0]);
|
2010-02-09 11:03:14 -08:00
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
vsctl_fatal("'%s' command takes exactly 1 or 3 arguments",
|
|
|
|
|
ctx->argv[0]);
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
2010-02-09 11:03:14 -08:00
|
|
|
|
if (may_exist) {
|
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
br = find_bridge(ctx, br_name, false);
|
2010-02-09 11:03:14 -08:00
|
|
|
|
if (br) {
|
|
|
|
|
if (!parent_name) {
|
|
|
|
|
if (br->parent) {
|
|
|
|
|
vsctl_fatal("\"--may-exist add-br %s\" but %s is "
|
|
|
|
|
"a VLAN bridge for VLAN %d",
|
|
|
|
|
br_name, br_name, br->vlan);
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
if (!br->parent) {
|
|
|
|
|
vsctl_fatal("\"--may-exist add-br %s %s %d\" but %s "
|
|
|
|
|
"is not a VLAN bridge",
|
|
|
|
|
br_name, parent_name, vlan, br_name);
|
|
|
|
|
} else if (strcmp(br->parent->name, parent_name)) {
|
|
|
|
|
vsctl_fatal("\"--may-exist add-br %s %s %d\" but %s "
|
|
|
|
|
"has the wrong parent %s",
|
|
|
|
|
br_name, parent_name, vlan,
|
|
|
|
|
br_name, br->parent->name);
|
|
|
|
|
} else if (br->vlan != vlan) {
|
|
|
|
|
vsctl_fatal("\"--may-exist add-br %s %s %d\" but %s "
|
|
|
|
|
"is a VLAN bridge for the wrong VLAN %d",
|
|
|
|
|
br_name, parent_name, vlan, br_name, br->vlan);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
check_conflicts(ctx, br_name,
|
2009-12-08 17:18:12 -08:00
|
|
|
|
xasprintf("cannot create a bridge named %s", br_name));
|
|
|
|
|
|
2010-02-09 11:03:14 -08:00
|
|
|
|
if (!parent_name) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct ovsrec_port *port;
|
|
|
|
|
struct ovsrec_interface *iface;
|
2010-02-09 11:03:14 -08:00
|
|
|
|
struct ovsrec_bridge *br;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
iface = ovsrec_interface_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_interface_set_name(iface, br_name);
|
2010-11-04 10:53:57 -07:00
|
|
|
|
ovsrec_interface_set_type(iface, "internal");
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
port = ovsrec_port_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_port_set_name(port, br_name);
|
|
|
|
|
ovsrec_port_set_interfaces(port, &iface, 1);
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
br = ovsrec_bridge_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_bridge_set_name(br, br_name);
|
|
|
|
|
ovsrec_bridge_set_ports(br, &port, 1);
|
|
|
|
|
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ovs_insert_bridge(ctx->ovs, br);
|
2010-02-09 11:03:14 -08:00
|
|
|
|
} else {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge *parent;
|
|
|
|
|
struct ovsrec_port *port;
|
|
|
|
|
struct ovsrec_interface *iface;
|
2010-02-09 11:03:14 -08:00
|
|
|
|
struct ovsrec_bridge *br;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
int64_t tag = vlan;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
parent = find_bridge(ctx, parent_name, false);
|
2012-03-16 13:12:54 -07:00
|
|
|
|
if (parent && parent->parent) {
|
2009-12-17 16:07:14 -08:00
|
|
|
|
vsctl_fatal("cannot create bridge with fake bridge as parent");
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
if (!parent) {
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("parent bridge %s does not exist", parent_name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
br = parent->br_cfg;
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
iface = ovsrec_interface_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_interface_set_name(iface, br_name);
|
|
|
|
|
ovsrec_interface_set_type(iface, "internal");
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
port = ovsrec_port_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_port_set_name(port, br_name);
|
|
|
|
|
ovsrec_port_set_interfaces(port, &iface, 1);
|
|
|
|
|
ovsrec_port_set_fake_bridge(port, true);
|
|
|
|
|
ovsrec_port_set_tag(port, &tag, 1);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
|
|
|
|
|
bridge_insert_port(br, port);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_invalidate_cache(ctx);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2012-04-17 17:07:00 -07:00
|
|
|
|
del_port(struct vsctl_context *ctx, struct vsctl_port *port)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2012-04-17 16:56:21 -07:00
|
|
|
|
struct vsctl_iface *iface, *next_iface;
|
2011-03-16 15:06:37 -07:00
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
bridge_delete_port((port->bridge->parent
|
|
|
|
|
? port->bridge->parent->br_cfg
|
|
|
|
|
: port->bridge->br_cfg), port->port_cfg);
|
2012-04-17 16:56:21 -07:00
|
|
|
|
|
|
|
|
|
LIST_FOR_EACH_SAFE (iface, next_iface, ifaces_node, &port->ifaces) {
|
|
|
|
|
del_cached_iface(ctx, iface);
|
|
|
|
|
}
|
|
|
|
|
del_cached_port(ctx, port);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
del_bridge(struct vsctl_context *ctx, struct vsctl_bridge *br)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *child, *next_child;
|
|
|
|
|
struct vsctl_port *port, *next_port;
|
2013-04-22 10:01:14 -07:00
|
|
|
|
const struct ovsrec_flow_sample_collector_set *fscset, *next_fscset;
|
2012-04-17 16:56:21 -07:00
|
|
|
|
|
|
|
|
|
HMAP_FOR_EACH_SAFE (child, next_child, children_node, &br->children) {
|
|
|
|
|
del_bridge(ctx, child);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
LIST_FOR_EACH_SAFE (port, next_port, ports_node, &br->ports) {
|
|
|
|
|
del_port(ctx, port);
|
|
|
|
|
}
|
|
|
|
|
|
2013-04-22 10:01:14 -07:00
|
|
|
|
OVSREC_FLOW_SAMPLE_COLLECTOR_SET_FOR_EACH_SAFE (fscset, next_fscset,
|
|
|
|
|
ctx->idl) {
|
|
|
|
|
if (fscset->bridge == br->br_cfg) {
|
|
|
|
|
ovsrec_flow_sample_collector_set_delete(fscset);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 16:56:21 -07:00
|
|
|
|
del_cached_bridge(ctx, br);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_del_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2009-12-10 14:07:33 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
bridge = find_bridge(ctx, ctx->argv[1], must_exist);
|
2009-12-10 14:07:33 -08:00
|
|
|
|
if (bridge) {
|
2012-04-17 16:56:21 -07:00
|
|
|
|
del_bridge(ctx, bridge);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-09 13:28:48 -08:00
|
|
|
|
static void
|
|
|
|
|
output_sorted(struct svec *svec, struct ds *output)
|
|
|
|
|
{
|
|
|
|
|
const char *name;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
svec_sort(svec);
|
|
|
|
|
SVEC_FOR_EACH (i, name, svec) {
|
|
|
|
|
ds_put_format(output, "%s\n", name);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_list_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct shash_node *node;
|
2009-12-09 13:28:48 -08:00
|
|
|
|
struct svec bridges;
|
2012-11-30 18:50:18 -08:00
|
|
|
|
bool real = shash_find(&ctx->options, "--real");
|
|
|
|
|
bool fake = shash_find(&ctx->options, "--fake");
|
|
|
|
|
|
|
|
|
|
/* If neither fake nor real were requested, return both. */
|
|
|
|
|
if (!real && !fake) {
|
|
|
|
|
real = fake = true;
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
|
|
|
|
|
svec_init(&bridges);
|
2012-04-17 17:07:00 -07:00
|
|
|
|
SHASH_FOR_EACH (node, &ctx->bridges) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge *br = node->data;
|
2012-11-30 18:50:18 -08:00
|
|
|
|
|
|
|
|
|
if (br->parent ? fake : real) {
|
|
|
|
|
svec_add(&bridges, br->name);
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2009-12-10 13:28:22 -08:00
|
|
|
|
output_sorted(&bridges, &ctx->output);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
svec_destroy(&bridges);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_exists(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
if (!find_bridge(ctx, ctx->argv[1], false)) {
|
2010-02-02 14:26:17 -08:00
|
|
|
|
vsctl_exit(2);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-09 17:04:08 -08:00
|
|
|
|
static void
|
2012-05-22 01:53:07 -07:00
|
|
|
|
set_external_id(struct smap *old, struct smap *new,
|
|
|
|
|
char *key, char *value)
|
2009-12-09 17:04:08 -08:00
|
|
|
|
{
|
2012-05-22 01:53:07 -07:00
|
|
|
|
smap_clone(new, old);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
|
|
|
|
|
if (value) {
|
2012-05-22 01:53:07 -07:00
|
|
|
|
smap_replace(new, key, value);
|
|
|
|
|
} else {
|
|
|
|
|
smap_remove(new, key);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_br_set_external_id(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
pre_get_info(ctx);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_bridge_col_external_ids);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_port_col_external_ids);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-09 17:04:08 -08:00
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_set_external_id(struct vsctl_context *ctx)
|
2009-12-09 17:04:08 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *bridge;
|
2012-05-22 01:53:07 -07:00
|
|
|
|
struct smap new;
|
2009-12-09 17:04:08 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
bridge = find_bridge(ctx, ctx->argv[1], true);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
if (bridge->br_cfg) {
|
2012-05-22 01:53:07 -07:00
|
|
|
|
|
|
|
|
|
set_external_id(&bridge->br_cfg->external_ids, &new, ctx->argv[2],
|
|
|
|
|
ctx->argc >= 4 ? ctx->argv[3] : NULL);
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsrec_bridge_verify_external_ids(bridge->br_cfg);
|
2012-05-22 01:53:07 -07:00
|
|
|
|
ovsrec_bridge_set_external_ids(bridge->br_cfg, &new);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
} else {
|
2009-12-10 13:28:22 -08:00
|
|
|
|
char *key = xasprintf("fake-bridge-%s", ctx->argv[2]);
|
2012-04-17 17:07:00 -07:00
|
|
|
|
struct vsctl_port *port = shash_find_data(&ctx->ports, ctx->argv[1]);
|
2012-05-22 01:53:07 -07:00
|
|
|
|
set_external_id(&port->port_cfg->external_ids, &new,
|
|
|
|
|
key, ctx->argc >= 4 ? ctx->argv[3] : NULL);
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsrec_port_verify_external_ids(port->port_cfg);
|
2012-05-22 01:53:07 -07:00
|
|
|
|
ovsrec_port_set_external_ids(port->port_cfg, &new);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
free(key);
|
|
|
|
|
}
|
2012-05-22 01:53:07 -07:00
|
|
|
|
smap_destroy(&new);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2012-05-22 01:53:07 -07:00
|
|
|
|
get_external_id(struct smap *smap, const char *prefix, const char *key,
|
2009-12-09 17:04:08 -08:00
|
|
|
|
struct ds *output)
|
|
|
|
|
{
|
2012-05-22 01:53:07 -07:00
|
|
|
|
if (key) {
|
|
|
|
|
char *prefix_key = xasprintf("%s%s", prefix, key);
|
|
|
|
|
const char *value = smap_get(smap, prefix_key);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
|
2012-05-22 01:53:07 -07:00
|
|
|
|
if (value) {
|
|
|
|
|
ds_put_format(output, "%s\n", value);
|
|
|
|
|
}
|
|
|
|
|
free(prefix_key);
|
|
|
|
|
} else {
|
|
|
|
|
const struct smap_node **sorted = smap_sort(smap);
|
|
|
|
|
size_t prefix_len = strlen(prefix);
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < smap_count(smap); i++) {
|
|
|
|
|
const struct smap_node *node = sorted[i];
|
|
|
|
|
if (!strncmp(node->key, prefix, prefix_len)) {
|
|
|
|
|
ds_put_format(output, "%s=%s\n", node->key + prefix_len,
|
|
|
|
|
node->value);
|
|
|
|
|
}
|
2009-12-09 17:04:08 -08:00
|
|
|
|
}
|
2012-05-22 01:53:07 -07:00
|
|
|
|
free(sorted);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_br_get_external_id(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
pre_cmd_br_set_external_id(ctx);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-09 17:04:08 -08:00
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_get_external_id(struct vsctl_context *ctx)
|
2009-12-09 17:04:08 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
|
|
|
|
|
bridge = find_bridge(ctx, ctx->argv[1], true);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
if (bridge->br_cfg) {
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsrec_bridge_verify_external_ids(bridge->br_cfg);
|
2012-05-22 01:53:07 -07:00
|
|
|
|
get_external_id(&bridge->br_cfg->external_ids, "",
|
|
|
|
|
ctx->argc >= 3 ? ctx->argv[2] : NULL, &ctx->output);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
} else {
|
2012-04-17 17:07:00 -07:00
|
|
|
|
struct vsctl_port *port = shash_find_data(&ctx->ports, ctx->argv[1]);
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsrec_port_verify_external_ids(port->port_cfg);
|
2012-05-22 01:53:07 -07:00
|
|
|
|
get_external_id(&port->port_cfg->external_ids, "fake-bridge-",
|
|
|
|
|
ctx->argc >= 3 ? ctx->argv[2] : NULL, &ctx->output);
|
2009-12-09 17:04:08 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_list_ports(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *br;
|
2012-04-17 16:56:21 -07:00
|
|
|
|
struct vsctl_port *port;
|
2009-12-09 13:28:48 -08:00
|
|
|
|
struct svec ports;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
br = find_bridge(ctx, ctx->argv[1], true);
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsrec_bridge_verify_ports(br->br_cfg ? br->br_cfg : br->parent->br_cfg);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
|
|
|
|
|
svec_init(&ports);
|
2012-04-17 16:56:21 -07:00
|
|
|
|
LIST_FOR_EACH (port, ports_node, &br->ports) {
|
|
|
|
|
if (strcmp(port->port_cfg->name, br->name)) {
|
2009-12-09 13:28:48 -08:00
|
|
|
|
svec_add(&ports, port->port_cfg->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2009-12-10 13:28:22 -08:00
|
|
|
|
output_sorted(&ports, &ctx->output);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
svec_destroy(&ports);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2010-01-28 16:09:26 -08:00
|
|
|
|
add_port(struct vsctl_context *ctx,
|
2010-02-09 12:13:46 -08:00
|
|
|
|
const char *br_name, const char *port_name,
|
|
|
|
|
bool may_exist, bool fake_iface,
|
2010-04-05 12:58:21 -07:00
|
|
|
|
char *iface_names[], int n_ifaces,
|
|
|
|
|
char *settings[], int n_settings)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2012-04-17 16:56:21 -07:00
|
|
|
|
struct vsctl_port *vsctl_port;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
struct ovsrec_interface **ifaces;
|
|
|
|
|
struct ovsrec_port *port;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
2010-02-09 12:13:46 -08:00
|
|
|
|
if (may_exist) {
|
2010-09-02 10:09:09 -07:00
|
|
|
|
struct vsctl_port *vsctl_port;
|
2010-02-09 12:13:46 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_port = find_port(ctx, port_name, false);
|
2010-09-02 10:09:09 -07:00
|
|
|
|
if (vsctl_port) {
|
2010-02-09 12:13:46 -08:00
|
|
|
|
struct svec want_names, have_names;
|
|
|
|
|
|
|
|
|
|
svec_init(&want_names);
|
|
|
|
|
for (i = 0; i < n_ifaces; i++) {
|
|
|
|
|
svec_add(&want_names, iface_names[i]);
|
|
|
|
|
}
|
|
|
|
|
svec_sort(&want_names);
|
|
|
|
|
|
|
|
|
|
svec_init(&have_names);
|
2010-09-02 10:09:09 -07:00
|
|
|
|
for (i = 0; i < vsctl_port->port_cfg->n_interfaces; i++) {
|
|
|
|
|
svec_add(&have_names,
|
|
|
|
|
vsctl_port->port_cfg->interfaces[i]->name);
|
2010-02-09 12:13:46 -08:00
|
|
|
|
}
|
|
|
|
|
svec_sort(&have_names);
|
|
|
|
|
|
2010-09-02 10:09:09 -07:00
|
|
|
|
if (strcmp(vsctl_port->bridge->name, br_name)) {
|
2010-02-09 12:13:46 -08:00
|
|
|
|
char *command = vsctl_context_to_string(ctx);
|
|
|
|
|
vsctl_fatal("\"%s\" but %s is actually attached to bridge %s",
|
2010-09-02 10:09:09 -07:00
|
|
|
|
command, port_name, vsctl_port->bridge->name);
|
2010-02-09 12:13:46 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!svec_equal(&want_names, &have_names)) {
|
|
|
|
|
char *have_names_string = svec_join(&have_names, ", ", "");
|
|
|
|
|
char *command = vsctl_context_to_string(ctx);
|
|
|
|
|
|
|
|
|
|
vsctl_fatal("\"%s\" but %s actually has interface(s) %s",
|
|
|
|
|
command, port_name, have_names_string);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
svec_destroy(&want_names);
|
|
|
|
|
svec_destroy(&have_names);
|
|
|
|
|
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
check_conflicts(ctx, port_name,
|
2009-12-08 17:18:12 -08:00
|
|
|
|
xasprintf("cannot create a port named %s", port_name));
|
2010-02-09 12:13:46 -08:00
|
|
|
|
for (i = 0; i < n_ifaces; i++) {
|
2012-04-17 17:07:00 -07:00
|
|
|
|
check_conflicts(ctx, iface_names[i],
|
2010-02-09 12:13:46 -08:00
|
|
|
|
xasprintf("cannot create an interface named %s",
|
|
|
|
|
iface_names[i]));
|
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
bridge = find_bridge(ctx, br_name, true);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
ifaces = xmalloc(n_ifaces * sizeof *ifaces);
|
|
|
|
|
for (i = 0; i < n_ifaces; i++) {
|
2010-01-28 16:09:26 -08:00
|
|
|
|
ifaces[i] = ovsrec_interface_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_interface_set_name(ifaces[i], iface_names[i]);
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
port = ovsrec_port_insert(ctx->txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsrec_port_set_name(port, port_name);
|
|
|
|
|
ovsrec_port_set_interfaces(port, ifaces, n_ifaces);
|
2010-01-14 21:53:43 -08:00
|
|
|
|
ovsrec_port_set_bond_fake_iface(port, fake_iface);
|
2009-12-09 22:14:54 -08:00
|
|
|
|
|
2012-03-16 13:12:54 -07:00
|
|
|
|
if (bridge->parent) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
int64_t tag = bridge->vlan;
|
|
|
|
|
ovsrec_port_set_tag(port, &tag, 1);
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-05 12:58:21 -07:00
|
|
|
|
for (i = 0; i < n_settings; i++) {
|
2010-06-02 11:08:03 -07:00
|
|
|
|
set_column(get_table("Port"), &port->header_, settings[i],
|
|
|
|
|
ctx->symtab);
|
2010-04-05 12:58:21 -07:00
|
|
|
|
}
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
bridge_insert_port((bridge->parent ? bridge->parent->br_cfg
|
|
|
|
|
: bridge->br_cfg), port);
|
|
|
|
|
|
2012-04-17 16:56:21 -07:00
|
|
|
|
vsctl_port = add_port_to_cache(ctx, bridge, port);
|
|
|
|
|
for (i = 0; i < n_ifaces; i++) {
|
|
|
|
|
add_iface_to_cache(ctx, vsctl_port, ifaces[i]);
|
|
|
|
|
}
|
|
|
|
|
free(ifaces);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_add_port(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2011-05-04 13:49:42 -07:00
|
|
|
|
bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL;
|
2010-02-09 12:13:46 -08:00
|
|
|
|
|
|
|
|
|
add_port(ctx, ctx->argv[1], ctx->argv[2], may_exist, false,
|
2010-04-05 12:58:21 -07:00
|
|
|
|
&ctx->argv[2], 1, &ctx->argv[3], ctx->argc - 3);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_add_bond(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2011-05-04 13:49:42 -07:00
|
|
|
|
bool may_exist = shash_find(&ctx->options, "--may-exist") != NULL;
|
2010-01-14 21:53:43 -08:00
|
|
|
|
bool fake_iface = shash_find(&ctx->options, "--fake-iface");
|
2010-04-05 12:58:21 -07:00
|
|
|
|
int n_ifaces;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
n_ifaces = ctx->argc - 3;
|
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
|
|
|
|
if (strchr(ctx->argv[i], '=')) {
|
|
|
|
|
n_ifaces = i - 3;
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (n_ifaces < 2) {
|
|
|
|
|
vsctl_fatal("add-bond requires at least 2 interfaces, but only "
|
|
|
|
|
"%d were specified", n_ifaces);
|
|
|
|
|
}
|
2010-01-14 21:53:43 -08:00
|
|
|
|
|
2010-02-09 12:13:46 -08:00
|
|
|
|
add_port(ctx, ctx->argv[1], ctx->argv[2], may_exist, fake_iface,
|
2010-04-05 12:58:21 -07:00
|
|
|
|
&ctx->argv[3], n_ifaces,
|
|
|
|
|
&ctx->argv[n_ifaces + 3], ctx->argc - 3 - n_ifaces);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_del_port(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
2009-12-10 14:07:33 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2010-02-22 16:36:30 -08:00
|
|
|
|
bool with_iface = shash_find(&ctx->options, "--with-iface") != NULL;
|
2013-06-18 21:01:33 -07:00
|
|
|
|
const char *target = ctx->argv[ctx->argc - 1];
|
2010-02-22 16:36:30 -08:00
|
|
|
|
struct vsctl_port *port;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
2013-06-18 21:01:33 -07:00
|
|
|
|
if (find_bridge(ctx, target, false)) {
|
2013-07-08 10:47:37 -07:00
|
|
|
|
if (must_exist) {
|
|
|
|
|
vsctl_fatal("cannot delete port %s because it is the local port "
|
|
|
|
|
"for bridge %s (deleting this port requires deleting "
|
|
|
|
|
"the entire bridge)", target, target);
|
|
|
|
|
}
|
|
|
|
|
port = NULL;
|
2013-06-18 21:01:33 -07:00
|
|
|
|
} else if (!with_iface) {
|
|
|
|
|
port = find_port(ctx, target, must_exist);
|
2010-02-22 16:36:30 -08:00
|
|
|
|
} else {
|
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
port = find_port(ctx, target, false);
|
2010-02-22 16:36:30 -08:00
|
|
|
|
if (!port) {
|
2012-04-17 17:07:00 -07:00
|
|
|
|
iface = find_iface(ctx, target, false);
|
2010-02-22 16:36:30 -08:00
|
|
|
|
if (iface) {
|
|
|
|
|
port = iface->port;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (must_exist && !port) {
|
|
|
|
|
vsctl_fatal("no port or interface named %s", target);
|
2009-12-10 14:07:33 -08:00
|
|
|
|
}
|
2010-02-22 16:36:30 -08:00
|
|
|
|
}
|
2009-12-10 14:07:33 -08:00
|
|
|
|
|
2010-02-22 16:36:30 -08:00
|
|
|
|
if (port) {
|
|
|
|
|
if (ctx->argc == 3) {
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
bridge = find_bridge(ctx, ctx->argv[1], true);
|
2010-02-22 16:36:30 -08:00
|
|
|
|
if (port->bridge != bridge) {
|
|
|
|
|
if (port->bridge->parent == bridge) {
|
|
|
|
|
vsctl_fatal("bridge %s does not have a port %s (although "
|
|
|
|
|
"its parent bridge %s does)",
|
|
|
|
|
ctx->argv[1], ctx->argv[2],
|
|
|
|
|
bridge->parent->name);
|
|
|
|
|
} else {
|
|
|
|
|
vsctl_fatal("bridge %s does not have a port %s",
|
|
|
|
|
ctx->argv[1], ctx->argv[2]);
|
|
|
|
|
}
|
2009-12-10 14:07:33 -08:00
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2010-02-22 16:36:30 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
del_port(ctx, port);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_port_to_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_port *port;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
|
|
|
|
|
port = find_port(ctx, ctx->argv[1], true);
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ds_put_format(&ctx->output, "%s\n", port->bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_to_vlan(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
|
|
|
|
|
bridge = find_bridge(ctx, ctx->argv[1], true);
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ds_put_format(&ctx->output, "%d\n", bridge->vlan);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_br_to_parent(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *bridge;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
|
|
|
|
|
bridge = find_bridge(ctx, ctx->argv[1], true);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
if (bridge->parent) {
|
|
|
|
|
bridge = bridge->parent;
|
|
|
|
|
}
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ds_put_format(&ctx->output, "%s\n", bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_list_ifaces(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_bridge *br;
|
2012-04-17 16:56:21 -07:00
|
|
|
|
struct vsctl_port *port;
|
2009-12-09 13:28:48 -08:00
|
|
|
|
struct svec ifaces;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
|
|
|
|
|
br = find_bridge(ctx, ctx->argv[1], true);
|
2010-10-22 14:46:30 -07:00
|
|
|
|
verify_ports(ctx);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
|
|
|
|
|
svec_init(&ifaces);
|
2012-04-17 16:56:21 -07:00
|
|
|
|
LIST_FOR_EACH (port, ports_node, &br->ports) {
|
|
|
|
|
struct vsctl_iface *iface;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2012-04-17 16:56:21 -07:00
|
|
|
|
LIST_FOR_EACH (iface, ifaces_node, &port->ifaces) {
|
|
|
|
|
if (strcmp(iface->iface_cfg->name, br->name)) {
|
|
|
|
|
svec_add(&ifaces, iface->iface_cfg->name);
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2009-12-10 13:28:22 -08:00
|
|
|
|
output_sorted(&ifaces, &ctx->output);
|
2009-12-09 13:28:48 -08:00
|
|
|
|
svec_destroy(&ifaces);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2009-12-10 13:28:22 -08:00
|
|
|
|
cmd_iface_to_br(struct vsctl_context *ctx)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct vsctl_iface *iface;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
|
|
|
|
|
iface = find_iface(ctx, ctx->argv[1], true);
|
2009-12-10 13:28:22 -08:00
|
|
|
|
ds_put_format(&ctx->output, "%s\n", iface->port->bridge->name);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2009-12-09 17:04:08 -08:00
|
|
|
|
|
2010-10-22 14:46:30 -07:00
|
|
|
|
static void
|
|
|
|
|
verify_controllers(struct ovsrec_bridge *bridge)
|
|
|
|
|
{
|
2012-04-17 13:50:53 -07:00
|
|
|
|
size_t i;
|
2010-10-22 14:46:30 -07:00
|
|
|
|
|
2012-04-17 13:50:53 -07:00
|
|
|
|
ovsrec_bridge_verify_controller(bridge);
|
|
|
|
|
for (i = 0; i < bridge->n_controller; i++) {
|
|
|
|
|
ovsrec_controller_verify_target(bridge->controller[i]);
|
2010-10-22 14:46:30 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-12-08 14:24:59 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_controller(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
pre_get_info(ctx);
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_controller_col_target);
|
|
|
|
|
}
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
static void
|
2010-07-15 14:53:36 -07:00
|
|
|
|
cmd_get_controller(struct vsctl_context *ctx)
|
2010-04-20 10:43:42 -07:00
|
|
|
|
{
|
2010-07-15 14:53:36 -07:00
|
|
|
|
struct vsctl_bridge *br;
|
2010-04-20 10:43:42 -07:00
|
|
|
|
struct svec targets;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
|
|
|
|
|
br = find_bridge(ctx, ctx->argv[1], true);
|
2012-04-17 13:50:53 -07:00
|
|
|
|
if (br->parent) {
|
|
|
|
|
br = br->parent;
|
|
|
|
|
}
|
2010-10-22 14:46:30 -07:00
|
|
|
|
verify_controllers(br->br_cfg);
|
2010-07-15 14:53:36 -07:00
|
|
|
|
|
|
|
|
|
/* Print the targets in sorted order for reproducibility. */
|
2010-04-20 10:43:42 -07:00
|
|
|
|
svec_init(&targets);
|
2012-04-17 13:56:38 -07:00
|
|
|
|
for (i = 0; i < br->br_cfg->n_controller; i++) {
|
|
|
|
|
svec_add(&targets, br->br_cfg->controller[i]->target);
|
2010-04-20 10:43:42 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
svec_sort(&targets);
|
|
|
|
|
for (i = 0; i < targets.n; i++) {
|
|
|
|
|
ds_put_format(&ctx->output, "%s\n", targets.names[i]);
|
|
|
|
|
}
|
|
|
|
|
svec_destroy(&targets);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-03-16 15:06:37 -07:00
|
|
|
|
static void
|
|
|
|
|
delete_controllers(struct ovsrec_controller **controllers,
|
|
|
|
|
size_t n_controllers)
|
|
|
|
|
{
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < n_controllers; i++) {
|
|
|
|
|
ovsrec_controller_delete(controllers[i]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-16 15:10:35 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_del_controller(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2012-04-17 13:56:38 -07:00
|
|
|
|
struct ovsrec_bridge *br;
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-17 13:56:38 -07:00
|
|
|
|
br = find_real_bridge(ctx, ctx->argv[1], true)->br_cfg;
|
|
|
|
|
verify_controllers(br);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-17 13:56:38 -07:00
|
|
|
|
if (br->controller) {
|
|
|
|
|
delete_controllers(br->controller, br->n_controller);
|
|
|
|
|
ovsrec_bridge_set_controller(br, NULL, 0);
|
2012-04-17 17:07:00 -07:00
|
|
|
|
}
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-04-20 10:43:42 -07:00
|
|
|
|
static struct ovsrec_controller **
|
|
|
|
|
insert_controllers(struct ovsdb_idl_txn *txn, char *targets[], size_t n)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_controller **controllers;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
controllers = xmalloc(n * sizeof *controllers);
|
|
|
|
|
for (i = 0; i < n; i++) {
|
2011-10-12 00:03:10 -07:00
|
|
|
|
if (vconn_verify_name(targets[i]) && pvconn_verify_name(targets[i])) {
|
|
|
|
|
VLOG_WARN("target type \"%s\" is possibly erroneous", targets[i]);
|
|
|
|
|
}
|
2010-04-20 10:43:42 -07:00
|
|
|
|
controllers[i] = ovsrec_controller_insert(txn);
|
|
|
|
|
ovsrec_controller_set_target(controllers[i], targets[i]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return controllers;
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-16 15:10:35 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_set_controller(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2010-07-15 14:53:36 -07:00
|
|
|
|
struct ovsrec_controller **controllers;
|
2012-04-17 13:56:38 -07:00
|
|
|
|
struct ovsrec_bridge *br;
|
2010-07-15 14:53:36 -07:00
|
|
|
|
size_t n;
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
|
2012-04-17 13:56:38 -07:00
|
|
|
|
br = find_real_bridge(ctx, ctx->argv[1], true)->br_cfg;
|
|
|
|
|
verify_controllers(br);
|
2011-03-16 15:06:37 -07:00
|
|
|
|
|
2012-04-17 13:56:38 -07:00
|
|
|
|
delete_controllers(br->controller, br->n_controller);
|
2010-04-20 10:43:42 -07:00
|
|
|
|
|
2010-07-15 14:53:36 -07:00
|
|
|
|
n = ctx->argc - 2;
|
|
|
|
|
controllers = insert_controllers(ctx->txn, &ctx->argv[2], n);
|
2012-04-17 13:56:38 -07:00
|
|
|
|
ovsrec_bridge_set_controller(br, controllers, n);
|
2010-07-15 14:53:36 -07:00
|
|
|
|
free(controllers);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_get_fail_mode(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2010-07-15 14:53:36 -07:00
|
|
|
|
struct vsctl_bridge *br;
|
2012-04-19 14:27:40 -07:00
|
|
|
|
const char *fail_mode;
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
br = find_bridge(ctx, ctx->argv[1], true);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-19 14:27:40 -07:00
|
|
|
|
if (br->parent) {
|
|
|
|
|
br = br->parent;
|
|
|
|
|
}
|
|
|
|
|
ovsrec_bridge_verify_fail_mode(br->br_cfg);
|
|
|
|
|
|
|
|
|
|
fail_mode = br->br_cfg->fail_mode;
|
|
|
|
|
if (fail_mode && strlen(fail_mode)) {
|
|
|
|
|
ds_put_format(&ctx->output, "%s\n", fail_mode);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_del_fail_mode(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2010-07-15 14:53:36 -07:00
|
|
|
|
struct vsctl_bridge *br;
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
br = find_real_bridge(ctx, ctx->argv[1], true);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
ovsrec_bridge_set_fail_mode(br->br_cfg, NULL);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_set_fail_mode(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2010-07-15 14:53:36 -07:00
|
|
|
|
struct vsctl_bridge *br;
|
|
|
|
|
const char *fail_mode = ctx->argv[2];
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_populate_cache(ctx);
|
|
|
|
|
|
|
|
|
|
br = find_real_bridge(ctx, ctx->argv[1], true);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
|
|
|
|
|
if (strcmp(fail_mode, "standalone") && strcmp(fail_mode, "secure")) {
|
|
|
|
|
vsctl_fatal("fail-mode must be \"standalone\" or \"secure\"");
|
|
|
|
|
}
|
|
|
|
|
|
2010-07-15 20:56:43 -07:00
|
|
|
|
ovsrec_bridge_set_fail_mode(br->br_cfg, fail_mode);
|
2009-12-16 15:10:35 -08:00
|
|
|
|
}
|
2009-12-18 13:43:28 -08:00
|
|
|
|
|
2011-02-04 13:30:02 -08:00
|
|
|
|
static void
|
|
|
|
|
verify_managers(const struct ovsrec_open_vswitch *ovs)
|
|
|
|
|
{
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
ovsrec_open_vswitch_verify_manager_options(ovs);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ovs->n_manager_options; ++i) {
|
|
|
|
|
const struct ovsrec_manager *mgr = ovs->manager_options[i];
|
|
|
|
|
|
|
|
|
|
ovsrec_manager_verify_target(mgr);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
pre_manager(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_manager_options);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_manager_col_target);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_get_manager(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsrec_open_vswitch *ovs = ctx->ovs;
|
|
|
|
|
struct svec targets;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
verify_managers(ovs);
|
|
|
|
|
|
|
|
|
|
/* Print the targets in sorted order for reproducibility. */
|
|
|
|
|
svec_init(&targets);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ovs->n_manager_options; i++) {
|
|
|
|
|
svec_add(&targets, ovs->manager_options[i]->target);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
svec_sort_unique(&targets);
|
|
|
|
|
for (i = 0; i < targets.n; i++) {
|
|
|
|
|
ds_put_format(&ctx->output, "%s\n", targets.names[i]);
|
|
|
|
|
}
|
|
|
|
|
svec_destroy(&targets);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
2011-03-16 15:06:37 -07:00
|
|
|
|
delete_managers(const struct vsctl_context *ctx)
|
2011-02-04 13:30:02 -08:00
|
|
|
|
{
|
|
|
|
|
const struct ovsrec_open_vswitch *ovs = ctx->ovs;
|
2011-03-16 15:06:37 -07:00
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
/* Delete Manager rows pointed to by 'manager_options' column. */
|
|
|
|
|
for (i = 0; i < ovs->n_manager_options; i++) {
|
|
|
|
|
ovsrec_manager_delete(ovs->manager_options[i]);
|
|
|
|
|
}
|
2011-02-04 13:30:02 -08:00
|
|
|
|
|
2011-03-16 15:06:37 -07:00
|
|
|
|
/* Delete 'Manager' row refs in 'manager_options' column. */
|
2011-03-10 11:15:01 -08:00
|
|
|
|
ovsrec_open_vswitch_set_manager_options(ovs, NULL, 0);
|
2011-02-04 13:30:02 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-03-16 15:06:37 -07:00
|
|
|
|
static void
|
|
|
|
|
cmd_del_manager(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsrec_open_vswitch *ovs = ctx->ovs;
|
|
|
|
|
|
|
|
|
|
verify_managers(ovs);
|
|
|
|
|
delete_managers(ctx);
|
|
|
|
|
}
|
|
|
|
|
|
2011-02-04 13:30:02 -08:00
|
|
|
|
static void
|
|
|
|
|
insert_managers(struct vsctl_context *ctx, char *targets[], size_t n)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_manager **managers;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
/* Insert each manager in a new row in Manager table. */
|
|
|
|
|
managers = xmalloc(n * sizeof *managers);
|
|
|
|
|
for (i = 0; i < n; i++) {
|
2011-10-12 00:03:10 -07:00
|
|
|
|
if (stream_verify_name(targets[i]) && pstream_verify_name(targets[i])) {
|
|
|
|
|
VLOG_WARN("target type \"%s\" is possibly erroneous", targets[i]);
|
|
|
|
|
}
|
2011-02-04 13:30:02 -08:00
|
|
|
|
managers[i] = ovsrec_manager_insert(ctx->txn);
|
|
|
|
|
ovsrec_manager_set_target(managers[i], targets[i]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Store uuids of new Manager rows in 'manager_options' column. */
|
|
|
|
|
ovsrec_open_vswitch_set_manager_options(ctx->ovs, managers, n);
|
|
|
|
|
free(managers);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_set_manager(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const size_t n = ctx->argc - 1;
|
|
|
|
|
|
2011-03-16 15:06:37 -07:00
|
|
|
|
verify_managers(ctx->ovs);
|
|
|
|
|
delete_managers(ctx);
|
2011-02-04 13:30:02 -08:00
|
|
|
|
insert_managers(ctx, &ctx->argv[1], n);
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_get_ssl(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl);
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_private_key);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_certificate);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_ca_cert);
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_ssl_col_bootstrap_ca_cert);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-18 13:43:28 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_get_ssl(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
struct ovsrec_ssl *ssl = ctx->ovs->ssl;
|
|
|
|
|
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsrec_open_vswitch_verify_ssl(ctx->ovs);
|
2009-12-18 13:43:28 -08:00
|
|
|
|
if (ssl) {
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsrec_ssl_verify_private_key(ssl);
|
|
|
|
|
ovsrec_ssl_verify_certificate(ssl);
|
|
|
|
|
ovsrec_ssl_verify_ca_cert(ssl);
|
|
|
|
|
ovsrec_ssl_verify_bootstrap_ca_cert(ssl);
|
|
|
|
|
|
2009-12-18 13:43:28 -08:00
|
|
|
|
ds_put_format(&ctx->output, "Private key: %s\n", ssl->private_key);
|
|
|
|
|
ds_put_format(&ctx->output, "Certificate: %s\n", ssl->certificate);
|
|
|
|
|
ds_put_format(&ctx->output, "CA Certificate: %s\n", ssl->ca_cert);
|
|
|
|
|
ds_put_format(&ctx->output, "Bootstrap: %s\n",
|
|
|
|
|
ssl->bootstrap_ca_cert ? "true" : "false");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_del_ssl(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-18 13:43:28 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_del_ssl(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2011-03-16 15:06:37 -07:00
|
|
|
|
struct ovsrec_ssl *ssl = ctx->ovs->ssl;
|
|
|
|
|
|
|
|
|
|
if (ssl) {
|
|
|
|
|
ovsrec_open_vswitch_verify_ssl(ctx->ovs);
|
|
|
|
|
ovsrec_ssl_delete(ssl);
|
|
|
|
|
ovsrec_open_vswitch_set_ssl(ctx->ovs, NULL);
|
|
|
|
|
}
|
2009-12-18 13:43:28 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_set_ssl(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, &ovsrec_open_vswitch_col_ssl);
|
|
|
|
|
}
|
|
|
|
|
|
2009-12-18 13:43:28 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_set_ssl(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
bool bootstrap = shash_find(&ctx->options, "--bootstrap");
|
2011-03-16 15:06:37 -07:00
|
|
|
|
struct ovsrec_ssl *ssl = ctx->ovs->ssl;
|
2009-12-18 13:43:28 -08:00
|
|
|
|
|
2011-03-16 15:06:37 -07:00
|
|
|
|
ovsrec_open_vswitch_verify_ssl(ctx->ovs);
|
|
|
|
|
if (ssl) {
|
|
|
|
|
ovsrec_ssl_delete(ssl);
|
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
ssl = ovsrec_ssl_insert(ctx->txn);
|
2009-12-18 13:43:28 -08:00
|
|
|
|
|
|
|
|
|
ovsrec_ssl_set_private_key(ssl, ctx->argv[1]);
|
|
|
|
|
ovsrec_ssl_set_certificate(ssl, ctx->argv[2]);
|
|
|
|
|
ovsrec_ssl_set_ca_cert(ssl, ctx->argv[3]);
|
|
|
|
|
|
|
|
|
|
ovsrec_ssl_set_bootstrap_ca_cert(ssl, bootstrap);
|
|
|
|
|
|
|
|
|
|
ovsrec_open_vswitch_set_ssl(ctx->ovs, ssl);
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
/* Parameter commands. */
|
|
|
|
|
|
|
|
|
|
struct vsctl_row_id {
|
|
|
|
|
const struct ovsdb_idl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_column *name_column;
|
|
|
|
|
const struct ovsdb_idl_column *uuid_column;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
struct vsctl_table_class {
|
|
|
|
|
struct ovsdb_idl_table_class *class;
|
|
|
|
|
struct vsctl_row_id row_ids[2];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static const struct vsctl_table_class tables[] = {
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_bridge,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_bridge, &ovsrec_bridge_col_name, NULL},
|
2013-04-22 10:01:14 -07:00
|
|
|
|
{&ovsrec_table_flow_sample_collector_set, NULL,
|
|
|
|
|
&ovsrec_flow_sample_collector_set_col_bridge}}},
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_controller,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_bridge,
|
|
|
|
|
&ovsrec_bridge_col_name,
|
2010-07-15 14:53:36 -07:00
|
|
|
|
&ovsrec_bridge_col_controller}}},
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_interface,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_interface, &ovsrec_interface_col_name, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_mirror,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_mirror, &ovsrec_mirror_col_name, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-11-05 10:22:18 -07:00
|
|
|
|
{&ovsrec_table_manager,
|
|
|
|
|
{{&ovsrec_table_manager, &ovsrec_manager_col_target, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_netflow,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_bridge,
|
|
|
|
|
&ovsrec_bridge_col_name,
|
|
|
|
|
&ovsrec_bridge_col_netflow},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_open_vswitch,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_open_vswitch, NULL, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_port,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_port, &ovsrec_port_col_name, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-06-17 15:04:12 -07:00
|
|
|
|
{&ovsrec_table_qos,
|
|
|
|
|
{{&ovsrec_table_port, &ovsrec_port_col_name, &ovsrec_port_col_qos},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
|
|
|
|
{&ovsrec_table_queue,
|
|
|
|
|
{{NULL, NULL, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{&ovsrec_table_ssl,
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{{&ovsrec_table_open_vswitch, NULL, &ovsrec_open_vswitch_col_ssl}}},
|
|
|
|
|
|
2010-05-05 10:38:24 -07:00
|
|
|
|
{&ovsrec_table_sflow,
|
|
|
|
|
{{&ovsrec_table_bridge,
|
|
|
|
|
&ovsrec_bridge_col_name,
|
|
|
|
|
&ovsrec_bridge_col_sflow},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2012-02-01 10:27:30 -08:00
|
|
|
|
{&ovsrec_table_flow_table,
|
|
|
|
|
{{&ovsrec_table_flow_table, &ovsrec_flow_table_col_name, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2013-04-22 10:01:14 -07:00
|
|
|
|
{&ovsrec_table_ipfix,
|
|
|
|
|
{{&ovsrec_table_bridge,
|
|
|
|
|
&ovsrec_bridge_col_name,
|
|
|
|
|
&ovsrec_bridge_col_ipfix},
|
|
|
|
|
{&ovsrec_table_flow_sample_collector_set, NULL,
|
|
|
|
|
&ovsrec_flow_sample_collector_set_col_ipfix}}},
|
|
|
|
|
|
|
|
|
|
{&ovsrec_table_flow_sample_collector_set,
|
|
|
|
|
{{NULL, NULL, NULL},
|
|
|
|
|
{NULL, NULL, NULL}}},
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
{NULL, {{NULL, NULL, NULL}, {NULL, NULL, NULL}}}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
};
|
|
|
|
|
|
2010-01-27 11:25:20 -08:00
|
|
|
|
static void
|
|
|
|
|
die_if_error(char *error)
|
|
|
|
|
{
|
|
|
|
|
if (error) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("%s", error);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
static int
|
|
|
|
|
to_lower_and_underscores(unsigned c)
|
|
|
|
|
{
|
|
|
|
|
return c == '-' ? '_' : tolower(c);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static unsigned int
|
|
|
|
|
score_partial_match(const char *name, const char *s)
|
|
|
|
|
{
|
|
|
|
|
int score;
|
|
|
|
|
|
2010-01-27 11:21:43 -08:00
|
|
|
|
if (!strcmp(name, s)) {
|
|
|
|
|
return UINT_MAX;
|
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
for (score = 0; ; score++, name++, s++) {
|
|
|
|
|
if (to_lower_and_underscores(*name) != to_lower_and_underscores(*s)) {
|
|
|
|
|
break;
|
|
|
|
|
} else if (*name == '\0') {
|
2010-01-27 11:21:43 -08:00
|
|
|
|
return UINT_MAX - 1;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return *s == '\0' ? score : 0;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct vsctl_table_class *
|
|
|
|
|
get_table(const char *table_name)
|
|
|
|
|
{
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct vsctl_table_class *best_match = NULL;
|
|
|
|
|
unsigned int best_score = 0;
|
|
|
|
|
|
|
|
|
|
for (table = tables; table->class; table++) {
|
|
|
|
|
unsigned int score = score_partial_match(table->class->name,
|
|
|
|
|
table_name);
|
|
|
|
|
if (score > best_score) {
|
|
|
|
|
best_match = table;
|
|
|
|
|
best_score = score;
|
|
|
|
|
} else if (score == best_score) {
|
|
|
|
|
best_match = NULL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (best_match) {
|
|
|
|
|
return best_match;
|
|
|
|
|
} else if (best_score) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("multiple table names match \"%s\"", table_name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("unknown table \"%s\"", table_name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static const struct vsctl_table_class *
|
|
|
|
|
pre_get_table(struct vsctl_context *ctx, const char *table_name)
|
|
|
|
|
{
|
|
|
|
|
const struct vsctl_table_class *table_class;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table_class = get_table(table_name);
|
|
|
|
|
ovsdb_idl_add_table(ctx->idl, table_class->class);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(table_class->row_ids); i++) {
|
|
|
|
|
const struct vsctl_row_id *id = &table_class->row_ids[i];
|
|
|
|
|
if (id->table) {
|
|
|
|
|
ovsdb_idl_add_table(ctx->idl, id->table);
|
|
|
|
|
}
|
|
|
|
|
if (id->name_column) {
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, id->name_column);
|
|
|
|
|
}
|
|
|
|
|
if (id->uuid_column) {
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, id->uuid_column);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return table_class;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
static const struct ovsdb_idl_row *
|
|
|
|
|
get_row_by_id(struct vsctl_context *ctx, const struct vsctl_table_class *table,
|
2010-07-14 17:04:22 -07:00
|
|
|
|
const struct vsctl_row_id *id, const char *record_id)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl_row *referrer, *final;
|
|
|
|
|
|
|
|
|
|
if (!id->table) {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (!id->name_column) {
|
|
|
|
|
if (strcmp(record_id, ".")) {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
referrer = ovsdb_idl_first_row(ctx->idl, id->table);
|
|
|
|
|
if (!referrer || ovsdb_idl_next_row(referrer)) {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
|
|
|
|
|
referrer = NULL;
|
|
|
|
|
for (row = ovsdb_idl_first_row(ctx->idl, id->table);
|
2010-07-14 17:04:22 -07:00
|
|
|
|
row != NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
row = ovsdb_idl_next_row(row))
|
|
|
|
|
{
|
2010-06-16 14:35:48 -07:00
|
|
|
|
const struct ovsdb_datum *name;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
name = ovsdb_idl_get(row, id->name_column,
|
|
|
|
|
OVSDB_TYPE_STRING, OVSDB_TYPE_VOID);
|
2010-07-14 17:04:22 -07:00
|
|
|
|
if (name->n == 1 && !strcmp(name->keys[0].string, record_id)) {
|
|
|
|
|
if (referrer) {
|
|
|
|
|
vsctl_fatal("multiple rows in %s match \"%s\"",
|
|
|
|
|
table->class->name, record_id);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-07-14 17:04:22 -07:00
|
|
|
|
referrer = row;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
if (!referrer) {
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 15:08:10 -05:00
|
|
|
|
final = NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (id->uuid_column) {
|
2010-06-16 14:35:48 -07:00
|
|
|
|
const struct ovsdb_datum *uuid;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsdb_idl_txn_verify(referrer, id->uuid_column);
|
2010-06-16 14:35:48 -07:00
|
|
|
|
uuid = ovsdb_idl_get(referrer, id->uuid_column,
|
|
|
|
|
OVSDB_TYPE_UUID, OVSDB_TYPE_VOID);
|
|
|
|
|
if (uuid->n == 1) {
|
2010-01-25 10:13:52 -08:00
|
|
|
|
final = ovsdb_idl_get_row_for_uuid(ctx->idl, table->class,
|
2010-06-16 14:35:48 -07:00
|
|
|
|
&uuid->keys[0].uuid);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
final = referrer;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return final;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static const struct ovsdb_idl_row *
|
2010-07-14 17:04:22 -07:00
|
|
|
|
get_row (struct vsctl_context *ctx,
|
2013-01-15 13:23:53 -08:00
|
|
|
|
const struct vsctl_table_class *table, const char *record_id,
|
|
|
|
|
bool must_exist)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
struct uuid uuid;
|
|
|
|
|
|
|
|
|
|
if (uuid_from_string(&uuid, record_id)) {
|
|
|
|
|
row = ovsdb_idl_get_row_for_uuid(ctx->idl, table->class, &uuid);
|
|
|
|
|
} else {
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(table->row_ids); i++) {
|
2010-07-14 17:04:22 -07:00
|
|
|
|
row = get_row_by_id(ctx, table, &table->row_ids[i], record_id);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (row) {
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2013-01-15 13:23:53 -08:00
|
|
|
|
if (must_exist && !row) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("no row \"%s\" in table %s",
|
|
|
|
|
record_id, table->class->name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
return row;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 11:25:20 -08:00
|
|
|
|
static char *
|
|
|
|
|
get_column(const struct vsctl_table_class *table, const char *column_name,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column **columnp)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *best_match = NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
unsigned int best_score = 0;
|
2010-02-08 14:09:36 -08:00
|
|
|
|
size_t i;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
for (i = 0; i < table->class->n_columns; i++) {
|
|
|
|
|
const struct ovsdb_idl_column *column = &table->class->columns[i];
|
|
|
|
|
unsigned int score = score_partial_match(column->name, column_name);
|
|
|
|
|
if (score > best_score) {
|
|
|
|
|
best_match = column;
|
|
|
|
|
best_score = score;
|
|
|
|
|
} else if (score == best_score) {
|
|
|
|
|
best_match = NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-27 11:25:20 -08:00
|
|
|
|
|
|
|
|
|
*columnp = best_match;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (best_match) {
|
2010-01-27 11:25:20 -08:00
|
|
|
|
return NULL;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else if (best_score) {
|
2010-01-27 11:25:20 -08:00
|
|
|
|
return xasprintf("%s contains more than one column whose name "
|
|
|
|
|
"matches \"%s\"", table->class->name, column_name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else {
|
2010-01-27 11:25:20 -08:00
|
|
|
|
return xasprintf("%s does not contain a column whose name matches "
|
|
|
|
|
"\"%s\"", table->class->name, column_name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2011-03-10 11:15:01 -08:00
|
|
|
|
static struct ovsdb_symbol *
|
2010-09-20 10:56:15 -07:00
|
|
|
|
create_symbol(struct ovsdb_symbol_table *symtab, const char *id, bool *newp)
|
|
|
|
|
{
|
|
|
|
|
struct ovsdb_symbol *symbol;
|
|
|
|
|
|
|
|
|
|
if (id[0] != '@') {
|
|
|
|
|
vsctl_fatal("row id \"%s\" does not begin with \"@\"", id);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (newp) {
|
|
|
|
|
*newp = ovsdb_symbol_table_get(symtab, id) == NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
symbol = ovsdb_symbol_table_insert(symtab, id);
|
2011-02-28 12:43:15 -08:00
|
|
|
|
if (symbol->created) {
|
2010-09-20 10:56:15 -07:00
|
|
|
|
vsctl_fatal("row id \"%s\" may only be specified on one --id option",
|
|
|
|
|
id);
|
|
|
|
|
}
|
2011-02-28 12:43:15 -08:00
|
|
|
|
symbol->created = true;
|
2011-03-10 11:15:01 -08:00
|
|
|
|
return symbol;
|
2010-09-20 10:56:15 -07:00
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_get_column(struct vsctl_context *ctx,
|
|
|
|
|
const struct vsctl_table_class *table, const char *column_name,
|
|
|
|
|
const struct ovsdb_idl_column **columnp)
|
|
|
|
|
{
|
|
|
|
|
die_if_error(get_column(table, column_name, columnp));
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, *columnp);
|
|
|
|
|
}
|
|
|
|
|
|
2010-06-28 17:20:15 -07:00
|
|
|
|
static char *
|
|
|
|
|
missing_operator_error(const char *arg, const char **allowed_operators,
|
|
|
|
|
size_t n_allowed)
|
|
|
|
|
{
|
|
|
|
|
struct ds s;
|
|
|
|
|
|
|
|
|
|
ds_init(&s);
|
|
|
|
|
ds_put_format(&s, "%s: argument does not end in ", arg);
|
|
|
|
|
ds_put_format(&s, "\"%s\"", allowed_operators[0]);
|
|
|
|
|
if (n_allowed == 2) {
|
|
|
|
|
ds_put_format(&s, " or \"%s\"", allowed_operators[1]);
|
|
|
|
|
} else if (n_allowed > 2) {
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
for (i = 1; i < n_allowed - 1; i++) {
|
|
|
|
|
ds_put_format(&s, ", \"%s\"", allowed_operators[i]);
|
|
|
|
|
}
|
|
|
|
|
ds_put_format(&s, ", or \"%s\"", allowed_operators[i]);
|
|
|
|
|
}
|
|
|
|
|
ds_put_format(&s, " followed by a value.");
|
|
|
|
|
|
|
|
|
|
return ds_steal_cstr(&s);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Breaks 'arg' apart into a number of fields in the following order:
|
|
|
|
|
*
|
2011-02-23 12:20:38 -08:00
|
|
|
|
* - The name of a column in 'table', stored into '*columnp'. The column
|
|
|
|
|
* name may be abbreviated.
|
2010-06-28 17:20:15 -07:00
|
|
|
|
*
|
2011-02-23 12:20:38 -08:00
|
|
|
|
* - Optionally ':' followed by a key string. The key is stored as a
|
|
|
|
|
* malloc()'d string into '*keyp', or NULL if no key is present in
|
|
|
|
|
* 'arg'.
|
2010-06-28 17:20:15 -07:00
|
|
|
|
*
|
|
|
|
|
* - If 'valuep' is nonnull, an operator followed by a value string. The
|
|
|
|
|
* allowed operators are the 'n_allowed' string in 'allowed_operators',
|
|
|
|
|
* or just "=" if 'n_allowed' is 0. If 'operatorp' is nonnull, then the
|
2012-01-11 09:55:53 -08:00
|
|
|
|
* index of the operator within 'allowed_operators' is stored into
|
|
|
|
|
* '*operatorp'. The value is stored as a malloc()'d string into
|
|
|
|
|
* '*valuep', or NULL if no value is present in 'arg'.
|
2010-06-28 17:20:15 -07:00
|
|
|
|
*
|
|
|
|
|
* On success, returns NULL. On failure, returned a malloc()'d string error
|
|
|
|
|
* message and stores NULL into all of the nonnull output arguments. */
|
2010-01-27 11:25:20 -08:00
|
|
|
|
static char * WARN_UNUSED_RESULT
|
2010-06-28 17:20:15 -07:00
|
|
|
|
parse_column_key_value(const char *arg,
|
|
|
|
|
const struct vsctl_table_class *table,
|
|
|
|
|
const struct ovsdb_idl_column **columnp, char **keyp,
|
2012-01-11 09:55:53 -08:00
|
|
|
|
int *operatorp,
|
2010-06-28 17:20:15 -07:00
|
|
|
|
const char **allowed_operators, size_t n_allowed,
|
|
|
|
|
char **valuep)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
|
|
|
|
const char *p = arg;
|
2011-02-23 12:20:38 -08:00
|
|
|
|
char *column_name;
|
2010-01-27 11:25:20 -08:00
|
|
|
|
char *error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(!(operatorp && !valuep));
|
2011-02-23 12:20:38 -08:00
|
|
|
|
*keyp = NULL;
|
2010-01-27 11:25:20 -08:00
|
|
|
|
if (valuep) {
|
|
|
|
|
*valuep = NULL;
|
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
|
|
|
|
/* Parse column name. */
|
2011-02-23 12:20:38 -08:00
|
|
|
|
error = ovsdb_token_parse(&p, &column_name);
|
|
|
|
|
if (error) {
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
if (column_name[0] == '\0') {
|
2010-02-02 14:26:53 -08:00
|
|
|
|
free(column_name);
|
2011-02-23 12:20:38 -08:00
|
|
|
|
error = xasprintf("%s: missing column name", arg);
|
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
error = get_column(table, column_name, columnp);
|
|
|
|
|
free(column_name);
|
|
|
|
|
if (error) {
|
|
|
|
|
goto error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Parse key string. */
|
2011-02-23 12:20:38 -08:00
|
|
|
|
if (*p == ':') {
|
|
|
|
|
p++;
|
2010-01-27 11:25:20 -08:00
|
|
|
|
error = ovsdb_token_parse(&p, keyp);
|
|
|
|
|
if (error) {
|
|
|
|
|
goto error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Parse value string. */
|
2010-06-28 17:20:15 -07:00
|
|
|
|
if (valuep) {
|
|
|
|
|
size_t best_len;
|
|
|
|
|
size_t i;
|
2012-01-11 09:55:53 -08:00
|
|
|
|
int best;
|
2010-06-28 17:20:15 -07:00
|
|
|
|
|
|
|
|
|
if (!allowed_operators) {
|
|
|
|
|
static const char *equals = "=";
|
|
|
|
|
allowed_operators = =
|
|
|
|
|
n_allowed = 1;
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-11 09:55:53 -08:00
|
|
|
|
best = -1;
|
2010-06-28 17:20:15 -07:00
|
|
|
|
best_len = 0;
|
|
|
|
|
for (i = 0; i < n_allowed; i++) {
|
|
|
|
|
const char *op = allowed_operators[i];
|
|
|
|
|
size_t op_len = strlen(op);
|
|
|
|
|
|
2010-06-29 09:54:10 -07:00
|
|
|
|
if (op_len > best_len && !strncmp(op, p, op_len) && p[op_len]) {
|
2010-06-28 17:20:15 -07:00
|
|
|
|
best_len = op_len;
|
2012-01-11 09:55:53 -08:00
|
|
|
|
best = i;
|
2010-06-28 17:20:15 -07:00
|
|
|
|
}
|
|
|
|
|
}
|
2012-01-11 09:55:53 -08:00
|
|
|
|
if (best < 0) {
|
2010-06-28 17:20:15 -07:00
|
|
|
|
error = missing_operator_error(arg, allowed_operators, n_allowed);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
goto error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-06-28 17:20:15 -07:00
|
|
|
|
|
|
|
|
|
if (operatorp) {
|
|
|
|
|
*operatorp = best;
|
|
|
|
|
}
|
2010-06-29 09:54:10 -07:00
|
|
|
|
*valuep = xstrdup(p + best_len);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else {
|
2010-01-27 11:25:20 -08:00
|
|
|
|
if (*p != '\0') {
|
2010-01-28 16:03:26 -08:00
|
|
|
|
error = xasprintf("%s: trailing garbage \"%s\" in argument",
|
|
|
|
|
arg, p);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
goto error;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
|
|
error:
|
2011-02-23 12:20:38 -08:00
|
|
|
|
*columnp = NULL;
|
|
|
|
|
free(*keyp);
|
|
|
|
|
*keyp = NULL;
|
2010-01-27 11:25:20 -08:00
|
|
|
|
if (valuep) {
|
|
|
|
|
free(*valuep);
|
|
|
|
|
*valuep = NULL;
|
2010-06-28 17:20:15 -07:00
|
|
|
|
if (operatorp) {
|
2012-01-11 09:55:53 -08:00
|
|
|
|
*operatorp = -1;
|
2010-06-28 17:20:15 -07:00
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-01-27 11:25:20 -08:00
|
|
|
|
return error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-09-05 10:35:20 -07:00
|
|
|
|
static const struct ovsdb_idl_column *
|
2010-11-16 09:15:40 -08:00
|
|
|
|
pre_parse_column_key_value(struct vsctl_context *ctx,
|
|
|
|
|
const char *arg,
|
|
|
|
|
const struct vsctl_table_class *table)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl_column *column;
|
|
|
|
|
const char *p;
|
|
|
|
|
char *column_name;
|
|
|
|
|
|
|
|
|
|
p = arg;
|
|
|
|
|
die_if_error(ovsdb_token_parse(&p, &column_name));
|
|
|
|
|
if (column_name[0] == '\0') {
|
|
|
|
|
vsctl_fatal("%s: missing column name", arg);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pre_get_column(ctx, table, column_name, &column);
|
|
|
|
|
free(column_name);
|
2012-09-05 10:35:20 -07:00
|
|
|
|
|
|
|
|
|
return column;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
check_mutable(const struct vsctl_table_class *table,
|
|
|
|
|
const struct ovsdb_idl_column *column)
|
|
|
|
|
{
|
|
|
|
|
if (!column->mutable) {
|
|
|
|
|
vsctl_fatal("cannot modify read-only column %s in table %s",
|
|
|
|
|
column->name, table->class->name);
|
|
|
|
|
}
|
2010-11-16 09:15:40 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
pre_cmd_get(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2011-05-09 10:29:51 -07:00
|
|
|
|
const char *id = shash_find_data(&ctx->options, "--id");
|
2010-11-16 09:15:40 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
int i;
|
|
|
|
|
|
2011-05-09 10:29:51 -07:00
|
|
|
|
/* Using "get" without --id or a column name could possibly make sense.
|
|
|
|
|
* Maybe, for example, a ovs-vsctl run wants to assert that a row exists.
|
|
|
|
|
* But it is unlikely that an interactive user would want to do that, so
|
|
|
|
|
* issue a warning if we're running on a terminal. */
|
|
|
|
|
if (!id && ctx->argc <= 3 && isatty(STDOUT_FILENO)) {
|
|
|
|
|
VLOG_WARN("\"get\" command without row arguments or \"--id\" is "
|
|
|
|
|
"possibly erroneous");
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
table = pre_get_table(ctx, table_name);
|
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
|
|
|
|
if (!strcasecmp(ctx->argv[i], "_uuid")
|
|
|
|
|
|| !strcasecmp(ctx->argv[i], "-uuid")) {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
pre_parse_column_key_value(ctx, ctx->argv[i], table);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_get(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2010-09-20 10:56:15 -07:00
|
|
|
|
const char *id = shash_find_data(&ctx->options, "--id");
|
2013-01-15 13:23:53 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2010-01-25 10:13:52 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
struct ds *out = &ctx->output;
|
|
|
|
|
int i;
|
|
|
|
|
|
2013-01-15 13:23:53 -08:00
|
|
|
|
if (id && !must_exist) {
|
|
|
|
|
vsctl_fatal("--if-exists and --id may not be specified together");
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
table = get_table(table_name);
|
2013-01-15 13:23:53 -08:00
|
|
|
|
row = get_row(ctx, table, record_id, must_exist);
|
|
|
|
|
if (!row) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2010-09-20 10:56:15 -07:00
|
|
|
|
if (id) {
|
2011-03-10 11:15:01 -08:00
|
|
|
|
struct ovsdb_symbol *symbol;
|
2010-09-20 10:56:15 -07:00
|
|
|
|
bool new;
|
|
|
|
|
|
2011-03-10 11:15:01 -08:00
|
|
|
|
symbol = create_symbol(ctx->symtab, id, &new);
|
2010-09-20 10:56:15 -07:00
|
|
|
|
if (!new) {
|
|
|
|
|
vsctl_fatal("row id \"%s\" specified on \"get\" command was used "
|
|
|
|
|
"before it was defined", id);
|
|
|
|
|
}
|
2011-03-10 11:15:01 -08:00
|
|
|
|
symbol->uuid = row->uuid;
|
|
|
|
|
|
|
|
|
|
/* This symbol refers to a row that already exists, so disable warnings
|
|
|
|
|
* about it being unreferenced. */
|
|
|
|
|
symbol->strong_ref = true;
|
2010-09-20 10:56:15 -07:00
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
const struct ovsdb_datum *datum;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
char *key_string;
|
|
|
|
|
|
2010-06-24 16:06:07 -07:00
|
|
|
|
/* Special case for obtaining the UUID of a row. We can't just do this
|
|
|
|
|
* through parse_column_key_value() below since it returns a "struct
|
|
|
|
|
* ovsdb_idl_column" and the UUID column doesn't have one. */
|
|
|
|
|
if (!strcasecmp(ctx->argv[i], "_uuid")
|
|
|
|
|
|| !strcasecmp(ctx->argv[i], "-uuid")) {
|
|
|
|
|
ds_put_format(out, UUID_FMT"\n", UUID_ARGS(&row->uuid));
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 11:25:20 -08:00
|
|
|
|
die_if_error(parse_column_key_value(ctx->argv[i], table,
|
2010-06-28 17:20:15 -07:00
|
|
|
|
&column, &key_string,
|
|
|
|
|
NULL, NULL, 0, NULL));
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsdb_idl_txn_verify(row, column);
|
2010-06-16 14:35:48 -07:00
|
|
|
|
datum = ovsdb_idl_read(row, column);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (key_string) {
|
|
|
|
|
union ovsdb_atom key;
|
|
|
|
|
unsigned int idx;
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
if (column->type.value.type == OVSDB_TYPE_VOID) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("cannot specify key to get for non-map column %s",
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 11:25:20 -08:00
|
|
|
|
die_if_error(ovsdb_atom_from_string(&key,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
&column->type.key,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
key_string, ctx->symtab));
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
idx = ovsdb_datum_find_key(datum, &key,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->type.key.type);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (idx == UINT_MAX) {
|
2013-01-15 13:23:53 -08:00
|
|
|
|
if (must_exist) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("no key \"%s\" in %s record \"%s\" column %s",
|
|
|
|
|
key_string, table->class->name, record_id,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->name);
|
2010-01-28 16:03:52 -08:00
|
|
|
|
}
|
|
|
|
|
} else {
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_atom_to_string(&datum->values[idx],
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->type.value.type, out);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_atom_destroy(&key, column->type.key.type);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
} else {
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_to_string(datum, &column->type, out);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
ds_put_char(out, '\n');
|
|
|
|
|
|
|
|
|
|
free(key_string);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2011-02-08 10:27:35 -08:00
|
|
|
|
static void
|
|
|
|
|
parse_column_names(const char *column_names,
|
|
|
|
|
const struct vsctl_table_class *table,
|
|
|
|
|
const struct ovsdb_idl_column ***columnsp,
|
|
|
|
|
size_t *n_columnsp)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl_column **columns;
|
|
|
|
|
size_t n_columns;
|
|
|
|
|
|
|
|
|
|
if (!column_names) {
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
n_columns = table->class->n_columns + 1;
|
|
|
|
|
columns = xmalloc(n_columns * sizeof *columns);
|
|
|
|
|
columns[0] = NULL;
|
|
|
|
|
for (i = 0; i < table->class->n_columns; i++) {
|
|
|
|
|
columns[i + 1] = &table->class->columns[i];
|
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
char *s = xstrdup(column_names);
|
|
|
|
|
size_t allocated_columns;
|
|
|
|
|
char *save_ptr = NULL;
|
|
|
|
|
char *column_name;
|
|
|
|
|
|
|
|
|
|
columns = NULL;
|
|
|
|
|
allocated_columns = n_columns = 0;
|
|
|
|
|
for (column_name = strtok_r(s, ", ", &save_ptr); column_name;
|
|
|
|
|
column_name = strtok_r(NULL, ", ", &save_ptr)) {
|
|
|
|
|
const struct ovsdb_idl_column *column;
|
|
|
|
|
|
|
|
|
|
if (!strcasecmp(column_name, "_uuid")) {
|
|
|
|
|
column = NULL;
|
|
|
|
|
} else {
|
|
|
|
|
die_if_error(get_column(table, column_name, &column));
|
|
|
|
|
}
|
|
|
|
|
if (n_columns >= allocated_columns) {
|
|
|
|
|
columns = x2nrealloc(columns, &allocated_columns,
|
|
|
|
|
sizeof *columns);
|
|
|
|
|
}
|
|
|
|
|
columns[n_columns++] = column;
|
|
|
|
|
}
|
|
|
|
|
free(s);
|
|
|
|
|
|
|
|
|
|
if (!n_columns) {
|
|
|
|
|
vsctl_fatal("must specify at least one column name");
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
*columnsp = columns;
|
|
|
|
|
*n_columnsp = n_columns;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
pre_list_columns(struct vsctl_context *ctx,
|
|
|
|
|
const struct vsctl_table_class *table,
|
|
|
|
|
const char *column_names)
|
|
|
|
|
{
|
|
|
|
|
const struct ovsdb_idl_column **columns;
|
|
|
|
|
size_t n_columns;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
parse_column_names(column_names, table, &columns, &n_columns);
|
|
|
|
|
for (i = 0; i < n_columns; i++) {
|
|
|
|
|
if (columns[i]) {
|
|
|
|
|
ovsdb_idl_add_column(ctx->idl, columns[i]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
free(columns);
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_list(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2011-02-08 10:27:35 -08:00
|
|
|
|
const char *column_names = shash_find_data(&ctx->options, "--columns");
|
2010-11-16 09:15:40 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
|
|
|
|
|
table = pre_get_table(ctx, table_name);
|
2011-02-08 10:27:35 -08:00
|
|
|
|
pre_list_columns(ctx, table, column_names);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-02-08 16:10:34 -08:00
|
|
|
|
static struct table *
|
|
|
|
|
list_make_table(const struct ovsdb_idl_column **columns, size_t n_columns)
|
|
|
|
|
{
|
|
|
|
|
struct table *out;
|
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
|
|
out = xmalloc(sizeof *out);
|
|
|
|
|
table_init(out);
|
|
|
|
|
|
|
|
|
|
for (i = 0; i < n_columns; i++) {
|
|
|
|
|
const struct ovsdb_idl_column *column = columns[i];
|
|
|
|
|
const char *column_name = column ? column->name : "_uuid";
|
|
|
|
|
|
|
|
|
|
table_add_column(out, "%s", column_name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return out;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
static void
|
2011-02-08 10:27:35 -08:00
|
|
|
|
list_record(const struct ovsdb_idl_row *row,
|
|
|
|
|
const struct ovsdb_idl_column **columns, size_t n_columns,
|
2011-02-08 16:10:34 -08:00
|
|
|
|
struct table *out)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
2010-02-08 14:09:36 -08:00
|
|
|
|
size_t i;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2013-01-15 13:23:53 -08:00
|
|
|
|
if (!row) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2011-02-08 16:10:34 -08:00
|
|
|
|
table_add_row(out);
|
2011-02-08 10:27:35 -08:00
|
|
|
|
for (i = 0; i < n_columns; i++) {
|
|
|
|
|
const struct ovsdb_idl_column *column = columns[i];
|
2011-02-08 16:10:34 -08:00
|
|
|
|
struct cell *cell = table_add_cell(out);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2011-02-08 10:27:35 -08:00
|
|
|
|
if (!column) {
|
2011-02-08 16:10:34 -08:00
|
|
|
|
struct ovsdb_datum datum;
|
|
|
|
|
union ovsdb_atom atom;
|
|
|
|
|
|
|
|
|
|
atom.uuid = row->uuid;
|
|
|
|
|
|
|
|
|
|
datum.keys = &atom;
|
|
|
|
|
datum.values = NULL;
|
|
|
|
|
datum.n = 1;
|
|
|
|
|
|
|
|
|
|
cell->json = ovsdb_datum_to_json(&datum, &ovsdb_type_uuid);
|
|
|
|
|
cell->type = &ovsdb_type_uuid;
|
2011-02-08 10:27:35 -08:00
|
|
|
|
} else {
|
|
|
|
|
const struct ovsdb_datum *datum = ovsdb_idl_read(row, column);
|
2011-02-08 16:10:34 -08:00
|
|
|
|
|
|
|
|
|
cell->json = ovsdb_datum_to_json(datum, &column->type);
|
|
|
|
|
cell->type = &column->type;
|
2011-02-08 10:27:35 -08:00
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_list(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2011-02-08 10:27:35 -08:00
|
|
|
|
const char *column_names = shash_find_data(&ctx->options, "--columns");
|
2013-01-15 13:23:53 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2011-02-08 10:27:35 -08:00
|
|
|
|
const struct ovsdb_idl_column **columns;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
2011-02-08 16:10:34 -08:00
|
|
|
|
struct table *out;
|
2011-02-08 10:27:35 -08:00
|
|
|
|
size_t n_columns;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
2011-02-08 10:27:35 -08:00
|
|
|
|
parse_column_names(column_names, table, &columns, &n_columns);
|
2011-02-08 16:10:34 -08:00
|
|
|
|
out = ctx->table = list_make_table(columns, n_columns);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
if (ctx->argc > 2) {
|
|
|
|
|
for (i = 2; i < ctx->argc; i++) {
|
2013-01-15 13:23:53 -08:00
|
|
|
|
list_record(get_row(ctx, table, ctx->argv[i], must_exist),
|
2011-02-08 10:27:35 -08:00
|
|
|
|
columns, n_columns, out);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
} else {
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
|
2011-03-29 10:58:45 -07:00
|
|
|
|
for (row = ovsdb_idl_first_row(ctx->idl, table->class); row != NULL;
|
|
|
|
|
row = ovsdb_idl_next_row(row)) {
|
2011-02-08 10:27:35 -08:00
|
|
|
|
list_record(row, columns, n_columns, out);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2011-02-08 10:27:35 -08:00
|
|
|
|
free(columns);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
2011-02-08 10:21:59 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_find(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *column_names = shash_find_data(&ctx->options, "--columns");
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = pre_get_table(ctx, table_name);
|
|
|
|
|
pre_list_columns(ctx, table, column_names);
|
|
|
|
|
for (i = 2; i < ctx->argc; i++) {
|
|
|
|
|
pre_parse_column_key_value(ctx, ctx->argv[i], table);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_find(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *column_names = shash_find_data(&ctx->options, "--columns");
|
|
|
|
|
const struct ovsdb_idl_column **columns;
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
2011-02-08 16:10:34 -08:00
|
|
|
|
struct table *out;
|
2011-02-08 10:21:59 -08:00
|
|
|
|
size_t n_columns;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
|
|
|
|
parse_column_names(column_names, table, &columns, &n_columns);
|
2011-02-08 16:10:34 -08:00
|
|
|
|
out = ctx->table = list_make_table(columns, n_columns);
|
2011-02-08 10:21:59 -08:00
|
|
|
|
for (row = ovsdb_idl_first_row(ctx->idl, table->class); row;
|
|
|
|
|
row = ovsdb_idl_next_row(row)) {
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
for (i = 2; i < ctx->argc; i++) {
|
|
|
|
|
if (!is_condition_satisfied(table, row, ctx->argv[i],
|
|
|
|
|
ctx->symtab)) {
|
|
|
|
|
goto next_row;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
list_record(row, columns, n_columns, out);
|
|
|
|
|
|
|
|
|
|
next_row: ;
|
|
|
|
|
}
|
2011-02-22 17:59:01 -08:00
|
|
|
|
free(columns);
|
2011-02-08 10:21:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_set(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = pre_get_table(ctx, table_name);
|
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
2012-09-05 10:35:20 -07:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
|
|
|
|
|
|
|
|
|
column = pre_parse_column_key_value(ctx, ctx->argv[i], table);
|
|
|
|
|
check_mutable(table, column);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
static void
|
2010-01-27 13:19:46 -08:00
|
|
|
|
set_column(const struct vsctl_table_class *table,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
const struct ovsdb_idl_row *row, const char *arg,
|
|
|
|
|
struct ovsdb_symbol_table *symtab)
|
2010-01-25 10:13:52 -08:00
|
|
|
|
{
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-01-27 13:19:46 -08:00
|
|
|
|
char *key_string, *value_string;
|
|
|
|
|
char *error;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
error = parse_column_key_value(arg, table, &column, &key_string,
|
2010-06-28 17:20:15 -07:00
|
|
|
|
NULL, NULL, 0, &value_string);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
die_if_error(error);
|
|
|
|
|
if (!value_string) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("%s: missing value", arg);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
if (key_string) {
|
|
|
|
|
union ovsdb_atom key, value;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
struct ovsdb_datum datum;
|
2010-01-27 13:19:46 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
if (column->type.value.type == OVSDB_TYPE_VOID) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("cannot specify key to set for non-map column %s",
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->name);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
die_if_error(ovsdb_atom_from_string(&key, &column->type.key,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
key_string, symtab));
|
2010-02-08 14:09:36 -08:00
|
|
|
|
die_if_error(ovsdb_atom_from_string(&value, &column->type.value,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
value_string, symtab));
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_init_empty(&datum);
|
|
|
|
|
ovsdb_datum_add_unsafe(&datum, &key, &value, &column->type);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_atom_destroy(&key, column->type.key.type);
|
|
|
|
|
ovsdb_atom_destroy(&value, column->type.value.type);
|
2010-02-02 14:26:53 -08:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_union(&datum, ovsdb_idl_read(row, column),
|
|
|
|
|
&column->type, false);
|
2014-01-28 01:20:43 +00:00
|
|
|
|
ovsdb_idl_txn_verify(row, column);
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_idl_txn_write(row, column, &datum);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
} else {
|
|
|
|
|
struct ovsdb_datum datum;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
die_if_error(ovsdb_datum_from_string(&datum, &column->type,
|
2010-06-02 11:08:03 -07:00
|
|
|
|
value_string, symtab));
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_idl_txn_write(row, column, &datum);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
free(key_string);
|
2010-02-02 14:26:53 -08:00
|
|
|
|
free(value_string);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_set(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2013-01-15 13:23:53 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2010-01-27 13:19:46 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
int i;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
table = get_table(table_name);
|
2013-01-15 13:23:53 -08:00
|
|
|
|
row = get_row(ctx, table, record_id, must_exist);
|
|
|
|
|
if (!row) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 13:19:46 -08:00
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
2010-06-02 11:08:03 -07:00
|
|
|
|
set_column(table, row, ctx->argv[i], ctx->symtab);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
|
|
|
|
vsctl_context_invalidate_cache(ctx);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_add(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *column_name = ctx->argv[3];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_column *column;
|
|
|
|
|
|
|
|
|
|
table = pre_get_table(ctx, table_name);
|
|
|
|
|
pre_get_column(ctx, table, column_name, &column);
|
2012-09-05 10:35:20 -07:00
|
|
|
|
check_mutable(table, column);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-25 10:13:52 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_add(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2013-01-15 13:23:53 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2010-01-25 10:13:52 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const char *column_name = ctx->argv[3];
|
|
|
|
|
const struct vsctl_table_class *table;
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-01-25 10:13:52 -08:00
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
const struct ovsdb_type *type;
|
|
|
|
|
struct ovsdb_datum old;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
2010-01-27 11:25:20 -08:00
|
|
|
|
die_if_error(get_column(table, column_name, &column));
|
2013-01-15 13:23:53 -08:00
|
|
|
|
row = get_row(ctx, table, record_id, must_exist);
|
|
|
|
|
if (!row) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
2010-01-28 16:03:26 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type = &column->type;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_clone(&old, ovsdb_idl_read(row, column), &column->type);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
for (i = 4; i < ctx->argc; i++) {
|
|
|
|
|
struct ovsdb_type add_type;
|
|
|
|
|
struct ovsdb_datum add;
|
|
|
|
|
|
|
|
|
|
add_type = *type;
|
|
|
|
|
add_type.n_min = 1;
|
|
|
|
|
add_type.n_max = UINT_MAX;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
die_if_error(ovsdb_datum_from_string(&add, &add_type, ctx->argv[i],
|
|
|
|
|
ctx->symtab));
|
2010-01-25 10:13:52 -08:00
|
|
|
|
ovsdb_datum_union(&old, &add, type, false);
|
|
|
|
|
ovsdb_datum_destroy(&add, type);
|
|
|
|
|
}
|
|
|
|
|
if (old.n > type->n_max) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("\"add\" operation would put %u %s in column %s of "
|
|
|
|
|
"table %s but the maximum number is %u",
|
|
|
|
|
old.n,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type->value.type == OVSDB_TYPE_VOID ? "values" : "pairs",
|
|
|
|
|
column->name, table->class->name, type->n_max);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsdb_idl_txn_verify(row, column);
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_idl_txn_write(row, column, &old);
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
|
|
|
|
vsctl_context_invalidate_cache(ctx);
|
2010-01-25 10:13:52 -08:00
|
|
|
|
}
|
2010-01-27 11:30:59 -08:00
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_remove(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *column_name = ctx->argv[3];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_column *column;
|
|
|
|
|
|
|
|
|
|
table = pre_get_table(ctx, table_name);
|
|
|
|
|
pre_get_column(ctx, table, column_name, &column);
|
2012-09-05 10:35:20 -07:00
|
|
|
|
check_mutable(table, column);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 11:30:59 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_remove(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2013-01-15 13:23:53 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2010-01-27 11:30:59 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const char *column_name = ctx->argv[3];
|
|
|
|
|
const struct vsctl_table_class *table;
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-01-27 11:30:59 -08:00
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
const struct ovsdb_type *type;
|
|
|
|
|
struct ovsdb_datum old;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
|
|
|
|
die_if_error(get_column(table, column_name, &column));
|
2013-01-15 13:23:53 -08:00
|
|
|
|
row = get_row(ctx, table, record_id, must_exist);
|
|
|
|
|
if (!row) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
2010-01-28 16:03:26 -08:00
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type = &column->type;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
ovsdb_datum_clone(&old, ovsdb_idl_read(row, column), &column->type);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
for (i = 4; i < ctx->argc; i++) {
|
|
|
|
|
struct ovsdb_type rm_type;
|
|
|
|
|
struct ovsdb_datum rm;
|
|
|
|
|
char *error;
|
|
|
|
|
|
|
|
|
|
rm_type = *type;
|
|
|
|
|
rm_type.n_min = 1;
|
|
|
|
|
rm_type.n_max = UINT_MAX;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
error = ovsdb_datum_from_string(&rm, &rm_type,
|
|
|
|
|
ctx->argv[i], ctx->symtab);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
if (error && ovsdb_type_is_map(&rm_type)) {
|
|
|
|
|
free(error);
|
2010-02-08 14:09:36 -08:00
|
|
|
|
rm_type.value.type = OVSDB_TYPE_VOID;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
die_if_error(ovsdb_datum_from_string(&rm, &rm_type,
|
|
|
|
|
ctx->argv[i], ctx->symtab));
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
|
|
|
|
ovsdb_datum_subtract(&old, type, &rm, &rm_type);
|
|
|
|
|
ovsdb_datum_destroy(&rm, &rm_type);
|
|
|
|
|
}
|
|
|
|
|
if (old.n < type->n_min) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("\"remove\" operation would put %u %s in column %s of "
|
2010-06-15 16:09:34 -07:00
|
|
|
|
"table %s but the minimum number is %u",
|
2010-02-02 14:25:11 -08:00
|
|
|
|
old.n,
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type->value.type == OVSDB_TYPE_VOID ? "values" : "pairs",
|
|
|
|
|
column->name, table->class->name, type->n_min);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
2010-10-22 14:46:30 -07:00
|
|
|
|
ovsdb_idl_txn_verify(row, column);
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_idl_txn_write(row, column, &old);
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
|
|
|
|
vsctl_context_invalidate_cache(ctx);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_clear(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = pre_get_table(ctx, table_name);
|
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
|
|
|
|
const struct ovsdb_idl_column *column;
|
|
|
|
|
|
|
|
|
|
pre_get_column(ctx, table, ctx->argv[i], &column);
|
2012-09-05 10:35:20 -07:00
|
|
|
|
check_mutable(table, column);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 11:30:59 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_clear(struct vsctl_context *ctx)
|
|
|
|
|
{
|
2013-01-15 13:23:53 -08:00
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2010-01-27 11:30:59 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
2013-01-15 13:23:53 -08:00
|
|
|
|
row = get_row(ctx, table, record_id, must_exist);
|
|
|
|
|
if (!row) {
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 11:30:59 -08:00
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
2010-02-08 14:09:36 -08:00
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-01-27 11:30:59 -08:00
|
|
|
|
const struct ovsdb_type *type;
|
|
|
|
|
struct ovsdb_datum datum;
|
|
|
|
|
|
|
|
|
|
die_if_error(get_column(table, ctx->argv[i], &column));
|
|
|
|
|
|
2010-02-08 14:09:36 -08:00
|
|
|
|
type = &column->type;
|
|
|
|
|
if (type->n_min > 0) {
|
2010-02-02 14:25:11 -08:00
|
|
|
|
vsctl_fatal("\"clear\" operation cannot be applied to column %s "
|
|
|
|
|
"of table %s, which is not allowed to be empty",
|
2010-02-08 14:09:36 -08:00
|
|
|
|
column->name, table->class->name);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ovsdb_datum_init_empty(&datum);
|
2010-02-08 14:09:36 -08:00
|
|
|
|
ovsdb_idl_txn_write(row, column, &datum);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
|
|
|
|
vsctl_context_invalidate_cache(ctx);
|
2010-01-27 11:30:59 -08:00
|
|
|
|
}
|
2010-01-27 13:19:46 -08:00
|
|
|
|
|
|
|
|
|
static void
|
2011-03-10 11:15:01 -08:00
|
|
|
|
pre_create(struct vsctl_context *ctx)
|
2010-01-27 13:19:46 -08:00
|
|
|
|
{
|
2010-06-02 11:08:03 -07:00
|
|
|
|
const char *id = shash_find_data(&ctx->options, "--id");
|
2010-01-27 13:19:46 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
2011-03-10 11:15:01 -08:00
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
|
|
|
|
if (!id && !table->class->is_root) {
|
|
|
|
|
VLOG_WARN("applying \"create\" command to table %s without --id "
|
|
|
|
|
"option will have no effect", table->class->name);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
|
cmd_create(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *id = shash_find_data(&ctx->options, "--id");
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table = get_table(table_name);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
const struct ovsdb_idl_row *row;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
const struct uuid *uuid;
|
2010-01-27 13:19:46 -08:00
|
|
|
|
int i;
|
|
|
|
|
|
2011-03-10 11:15:01 -08:00
|
|
|
|
if (id) {
|
|
|
|
|
struct ovsdb_symbol *symbol = create_symbol(ctx->symtab, id, NULL);
|
|
|
|
|
if (table->class->is_root) {
|
|
|
|
|
/* This table is in the root set, meaning that rows created in it
|
|
|
|
|
* won't disappear even if they are unreferenced, so disable
|
|
|
|
|
* warnings about that by pretending that there is a reference. */
|
|
|
|
|
symbol->strong_ref = true;
|
|
|
|
|
}
|
|
|
|
|
uuid = &symbol->uuid;
|
|
|
|
|
} else {
|
|
|
|
|
uuid = NULL;
|
|
|
|
|
}
|
2010-06-02 11:08:03 -07:00
|
|
|
|
|
|
|
|
|
row = ovsdb_idl_txn_insert(ctx->txn, table->class, uuid);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
for (i = 2; i < ctx->argc; i++) {
|
2010-06-02 11:08:03 -07:00
|
|
|
|
set_column(table, row, ctx->argv[i], ctx->symtab);
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
ds_put_format(&ctx->output, UUID_FMT, UUID_ARGS(&row->uuid));
|
2010-01-27 13:19:46 -08:00
|
|
|
|
}
|
2010-01-27 13:26:44 -08:00
|
|
|
|
|
2010-01-28 14:00:22 -08:00
|
|
|
|
/* This function may be used as the 'postprocess' function for commands that
|
|
|
|
|
* insert new rows into the database. It expects that the command's 'run'
|
|
|
|
|
* function prints the UUID reported by ovsdb_idl_txn_insert() as the command's
|
|
|
|
|
* sole output. It replaces that output by the row's permanent UUID assigned
|
|
|
|
|
* by the database server and appends a new-line.
|
|
|
|
|
*
|
|
|
|
|
* Currently we use this only for "create", because the higher-level commands
|
|
|
|
|
* are supposed to be independent of the actual structure of the vswitch
|
|
|
|
|
* configuration. */
|
|
|
|
|
static void
|
|
|
|
|
post_create(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const struct uuid *real;
|
|
|
|
|
struct uuid dummy;
|
|
|
|
|
|
2011-02-23 13:05:25 -08:00
|
|
|
|
if (!uuid_from_string(&dummy, ds_cstr(&ctx->output))) {
|
2013-12-17 10:32:12 -08:00
|
|
|
|
OVS_NOT_REACHED();
|
2011-02-23 13:05:25 -08:00
|
|
|
|
}
|
2010-01-28 14:00:22 -08:00
|
|
|
|
real = ovsdb_idl_txn_get_insert_uuid(ctx->txn, &dummy);
|
|
|
|
|
if (real) {
|
|
|
|
|
ds_clear(&ctx->output);
|
|
|
|
|
ds_put_format(&ctx->output, UUID_FMT, UUID_ARGS(real));
|
|
|
|
|
}
|
|
|
|
|
ds_put_char(&ctx->output, '\n');
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_destroy(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
|
|
|
|
|
pre_get_table(ctx, table_name);
|
|
|
|
|
}
|
|
|
|
|
|
2010-01-27 13:26:44 -08:00
|
|
|
|
static void
|
|
|
|
|
cmd_destroy(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
bool must_exist = !shash_find(&ctx->options, "--if-exists");
|
2012-05-16 11:39:55 -07:00
|
|
|
|
bool delete_all = shash_find(&ctx->options, "--all");
|
2010-01-27 13:26:44 -08:00
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
2012-05-16 11:39:55 -07:00
|
|
|
|
|
|
|
|
|
if (delete_all && ctx->argc > 2) {
|
|
|
|
|
vsctl_fatal("--all and records argument should not be specified together");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (delete_all && !must_exist) {
|
|
|
|
|
vsctl_fatal("--all and --if-exists should not be specified together");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (delete_all) {
|
2010-01-27 13:26:44 -08:00
|
|
|
|
const struct ovsdb_idl_row *row;
|
2012-05-16 11:39:55 -07:00
|
|
|
|
const struct ovsdb_idl_row *next_row;
|
2010-01-27 13:26:44 -08:00
|
|
|
|
|
2012-05-16 11:39:55 -07:00
|
|
|
|
for (row = ovsdb_idl_first_row(ctx->idl, table->class);
|
|
|
|
|
row;) {
|
|
|
|
|
next_row = ovsdb_idl_next_row(row);
|
|
|
|
|
ovsdb_idl_txn_delete(row);
|
|
|
|
|
row = next_row;
|
2010-01-27 13:26:44 -08:00
|
|
|
|
}
|
2012-05-16 11:39:55 -07:00
|
|
|
|
} else {
|
|
|
|
|
for (i = 2; i < ctx->argc; i++) {
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
2013-01-15 13:23:53 -08:00
|
|
|
|
row = get_row(ctx, table, ctx->argv[i], must_exist);
|
2012-05-16 11:39:55 -07:00
|
|
|
|
if (row) {
|
|
|
|
|
ovsdb_idl_txn_delete(row);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_invalidate_cache(ctx);
|
2010-01-27 13:26:44 -08:00
|
|
|
|
}
|
2010-06-29 09:54:10 -07:00
|
|
|
|
|
2012-01-11 09:55:53 -08:00
|
|
|
|
#define RELOPS \
|
|
|
|
|
RELOP(RELOP_EQ, "=") \
|
|
|
|
|
RELOP(RELOP_NE, "!=") \
|
|
|
|
|
RELOP(RELOP_LT, "<") \
|
|
|
|
|
RELOP(RELOP_GT, ">") \
|
|
|
|
|
RELOP(RELOP_LE, "<=") \
|
|
|
|
|
RELOP(RELOP_GE, ">=") \
|
|
|
|
|
RELOP(RELOP_SET_EQ, "{=}") \
|
|
|
|
|
RELOP(RELOP_SET_NE, "{!=}") \
|
|
|
|
|
RELOP(RELOP_SET_LT, "{<}") \
|
|
|
|
|
RELOP(RELOP_SET_GT, "{>}") \
|
|
|
|
|
RELOP(RELOP_SET_LE, "{<=}") \
|
|
|
|
|
RELOP(RELOP_SET_GE, "{>=}")
|
|
|
|
|
|
|
|
|
|
enum relop {
|
|
|
|
|
#define RELOP(ENUM, STRING) ENUM,
|
|
|
|
|
RELOPS
|
|
|
|
|
#undef RELOP
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
static bool
|
|
|
|
|
is_set_operator(enum relop op)
|
|
|
|
|
{
|
|
|
|
|
return (op == RELOP_SET_EQ || op == RELOP_SET_NE ||
|
|
|
|
|
op == RELOP_SET_LT || op == RELOP_SET_GT ||
|
|
|
|
|
op == RELOP_SET_LE || op == RELOP_SET_GE);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static bool
|
|
|
|
|
evaluate_relop(const struct ovsdb_datum *a, const struct ovsdb_datum *b,
|
|
|
|
|
const struct ovsdb_type *type, enum relop op)
|
|
|
|
|
{
|
|
|
|
|
switch (op) {
|
|
|
|
|
case RELOP_EQ:
|
|
|
|
|
case RELOP_SET_EQ:
|
|
|
|
|
return ovsdb_datum_compare_3way(a, b, type) == 0;
|
|
|
|
|
case RELOP_NE:
|
|
|
|
|
case RELOP_SET_NE:
|
|
|
|
|
return ovsdb_datum_compare_3way(a, b, type) != 0;
|
|
|
|
|
case RELOP_LT:
|
|
|
|
|
return ovsdb_datum_compare_3way(a, b, type) < 0;
|
|
|
|
|
case RELOP_GT:
|
|
|
|
|
return ovsdb_datum_compare_3way(a, b, type) > 0;
|
|
|
|
|
case RELOP_LE:
|
|
|
|
|
return ovsdb_datum_compare_3way(a, b, type) <= 0;
|
|
|
|
|
case RELOP_GE:
|
|
|
|
|
return ovsdb_datum_compare_3way(a, b, type) >= 0;
|
|
|
|
|
|
|
|
|
|
case RELOP_SET_LT:
|
|
|
|
|
return b->n > a->n && ovsdb_datum_includes_all(a, b, type);
|
|
|
|
|
case RELOP_SET_GT:
|
|
|
|
|
return a->n > b->n && ovsdb_datum_includes_all(b, a, type);
|
|
|
|
|
case RELOP_SET_LE:
|
|
|
|
|
return ovsdb_datum_includes_all(a, b, type);
|
|
|
|
|
case RELOP_SET_GE:
|
|
|
|
|
return ovsdb_datum_includes_all(b, a, type);
|
|
|
|
|
|
|
|
|
|
default:
|
2013-12-17 10:32:12 -08:00
|
|
|
|
OVS_NOT_REACHED();
|
2012-01-11 09:55:53 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-06-29 09:54:10 -07:00
|
|
|
|
static bool
|
2011-02-08 10:21:10 -08:00
|
|
|
|
is_condition_satisfied(const struct vsctl_table_class *table,
|
|
|
|
|
const struct ovsdb_idl_row *row, const char *arg,
|
|
|
|
|
struct ovsdb_symbol_table *symtab)
|
2010-06-29 09:54:10 -07:00
|
|
|
|
{
|
|
|
|
|
static const char *operators[] = {
|
2012-01-11 09:55:53 -08:00
|
|
|
|
#define RELOP(ENUM, STRING) STRING,
|
|
|
|
|
RELOPS
|
|
|
|
|
#undef RELOP
|
2010-06-29 09:54:10 -07:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
const struct ovsdb_idl_column *column;
|
2010-06-16 14:35:48 -07:00
|
|
|
|
const struct ovsdb_datum *have_datum;
|
2010-06-29 09:54:10 -07:00
|
|
|
|
char *key_string, *value_string;
|
2012-01-11 09:55:53 -08:00
|
|
|
|
struct ovsdb_type type;
|
|
|
|
|
int operator;
|
|
|
|
|
bool retval;
|
2010-06-29 09:54:10 -07:00
|
|
|
|
char *error;
|
|
|
|
|
|
|
|
|
|
error = parse_column_key_value(arg, table, &column, &key_string,
|
|
|
|
|
&operator, operators, ARRAY_SIZE(operators),
|
|
|
|
|
&value_string);
|
|
|
|
|
die_if_error(error);
|
|
|
|
|
if (!value_string) {
|
|
|
|
|
vsctl_fatal("%s: missing value", arg);
|
|
|
|
|
}
|
|
|
|
|
|
2012-01-11 09:55:53 -08:00
|
|
|
|
type = column->type;
|
|
|
|
|
type.n_max = UINT_MAX;
|
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
have_datum = ovsdb_idl_read(row, column);
|
2010-06-29 09:54:10 -07:00
|
|
|
|
if (key_string) {
|
2012-01-11 09:55:53 -08:00
|
|
|
|
union ovsdb_atom want_key;
|
|
|
|
|
struct ovsdb_datum b;
|
|
|
|
|
unsigned int idx;
|
2010-06-29 09:54:10 -07:00
|
|
|
|
|
|
|
|
|
if (column->type.value.type == OVSDB_TYPE_VOID) {
|
|
|
|
|
vsctl_fatal("cannot specify key to check for non-map column %s",
|
|
|
|
|
column->name);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
die_if_error(ovsdb_atom_from_string(&want_key, &column->type.key,
|
|
|
|
|
key_string, symtab));
|
2012-01-11 09:55:53 -08:00
|
|
|
|
|
|
|
|
|
type.key = type.value;
|
|
|
|
|
type.value.type = OVSDB_TYPE_VOID;
|
|
|
|
|
die_if_error(ovsdb_datum_from_string(&b, &type, value_string, symtab));
|
2010-06-29 09:54:10 -07:00
|
|
|
|
|
2010-06-16 14:35:48 -07:00
|
|
|
|
idx = ovsdb_datum_find_key(have_datum,
|
2010-06-29 09:54:10 -07:00
|
|
|
|
&want_key, column->type.key.type);
|
2012-01-11 09:55:53 -08:00
|
|
|
|
if (idx == UINT_MAX && !is_set_operator(operator)) {
|
|
|
|
|
retval = false;
|
|
|
|
|
} else {
|
|
|
|
|
struct ovsdb_datum a;
|
|
|
|
|
|
|
|
|
|
if (idx != UINT_MAX) {
|
|
|
|
|
a.n = 1;
|
|
|
|
|
a.keys = &have_datum->values[idx];
|
|
|
|
|
a.values = NULL;
|
|
|
|
|
} else {
|
|
|
|
|
a.n = 0;
|
|
|
|
|
a.keys = NULL;
|
|
|
|
|
a.values = NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
retval = evaluate_relop(&a, &b, &type, operator);
|
2010-06-29 09:54:10 -07:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
ovsdb_atom_destroy(&want_key, column->type.key.type);
|
2012-03-27 14:09:14 -07:00
|
|
|
|
ovsdb_datum_destroy(&b, &type);
|
2010-06-29 09:54:10 -07:00
|
|
|
|
} else {
|
|
|
|
|
struct ovsdb_datum want_datum;
|
|
|
|
|
|
|
|
|
|
die_if_error(ovsdb_datum_from_string(&want_datum, &column->type,
|
|
|
|
|
value_string, symtab));
|
2012-01-11 09:55:53 -08:00
|
|
|
|
retval = evaluate_relop(have_datum, &want_datum, &type, operator);
|
2010-06-29 09:54:10 -07:00
|
|
|
|
ovsdb_datum_destroy(&want_datum, &column->type);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
free(key_string);
|
|
|
|
|
free(value_string);
|
|
|
|
|
|
2012-01-11 09:55:53 -08:00
|
|
|
|
return retval;
|
2010-06-29 09:54:10 -07:00
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
pre_cmd_wait_until(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = pre_get_table(ctx, table_name);
|
|
|
|
|
|
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
|
|
|
|
pre_parse_column_key_value(ctx, ctx->argv[i], table);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2010-06-29 09:54:10 -07:00
|
|
|
|
static void
|
|
|
|
|
cmd_wait_until(struct vsctl_context *ctx)
|
|
|
|
|
{
|
|
|
|
|
const char *table_name = ctx->argv[1];
|
|
|
|
|
const char *record_id = ctx->argv[2];
|
|
|
|
|
const struct vsctl_table_class *table;
|
|
|
|
|
const struct ovsdb_idl_row *row;
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
|
|
table = get_table(table_name);
|
|
|
|
|
|
2013-01-15 13:23:53 -08:00
|
|
|
|
row = get_row(ctx, table, record_id, false);
|
2010-06-29 09:54:10 -07:00
|
|
|
|
if (!row) {
|
|
|
|
|
ctx->try_again = true;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
for (i = 3; i < ctx->argc; i++) {
|
2011-02-08 10:21:10 -08:00
|
|
|
|
if (!is_condition_satisfied(table, row, ctx->argv[i], ctx->symtab)) {
|
2010-06-29 09:54:10 -07:00
|
|
|
|
ctx->try_again = true;
|
|
|
|
|
return;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
2010-01-25 10:13:52 -08:00
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
/* Prepares 'ctx', which has already been initialized with
|
|
|
|
|
* vsctl_context_init(), for processing 'command'. */
|
2009-12-08 17:18:12 -08:00
|
|
|
|
static void
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_init_command(struct vsctl_context *ctx,
|
|
|
|
|
struct vsctl_command *command)
|
2010-01-28 16:09:26 -08:00
|
|
|
|
{
|
|
|
|
|
ctx->argc = command->argc;
|
|
|
|
|
ctx->argv = command->argv;
|
|
|
|
|
ctx->options = command->options;
|
|
|
|
|
|
|
|
|
|
ds_swap(&ctx->output, &command->output);
|
2011-02-08 16:10:34 -08:00
|
|
|
|
ctx->table = command->table;
|
2012-04-17 17:07:00 -07:00
|
|
|
|
|
|
|
|
|
ctx->verified_ports = false;
|
|
|
|
|
|
|
|
|
|
ctx->try_again = false;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Prepares 'ctx' for processing commands, initializing its members with the
|
|
|
|
|
* values passed in as arguments.
|
|
|
|
|
*
|
|
|
|
|
* If 'command' is nonnull, calls vsctl_context_init_command() to prepare for
|
|
|
|
|
* that particular command. */
|
|
|
|
|
static void
|
|
|
|
|
vsctl_context_init(struct vsctl_context *ctx, struct vsctl_command *command,
|
|
|
|
|
struct ovsdb_idl *idl, struct ovsdb_idl_txn *txn,
|
|
|
|
|
const struct ovsrec_open_vswitch *ovs,
|
|
|
|
|
struct ovsdb_symbol_table *symtab)
|
|
|
|
|
{
|
|
|
|
|
if (command) {
|
|
|
|
|
vsctl_context_init_command(ctx, command);
|
|
|
|
|
}
|
2010-01-28 16:09:26 -08:00
|
|
|
|
ctx->idl = idl;
|
|
|
|
|
ctx->txn = txn;
|
|
|
|
|
ctx->ovs = ovs;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
ctx->symtab = symtab;
|
2012-04-17 17:07:00 -07:00
|
|
|
|
ctx->cache_valid = false;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
/* Completes processing of 'command' within 'ctx'. */
|
2010-01-28 16:09:26 -08:00
|
|
|
|
static void
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_done_command(struct vsctl_context *ctx,
|
|
|
|
|
struct vsctl_command *command)
|
2010-01-28 16:09:26 -08:00
|
|
|
|
{
|
|
|
|
|
ds_swap(&ctx->output, &command->output);
|
2011-02-08 16:10:34 -08:00
|
|
|
|
command->table = ctx->table;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
}
|
|
|
|
|
|
2012-04-17 17:07:00 -07:00
|
|
|
|
/* Finishes up with 'ctx'.
|
|
|
|
|
*
|
|
|
|
|
* If command is nonnull, first calls vsctl_context_done_command() to complete
|
|
|
|
|
* processing that command within 'ctx'. */
|
|
|
|
|
static void
|
|
|
|
|
vsctl_context_done(struct vsctl_context *ctx, struct vsctl_command *command)
|
|
|
|
|
{
|
|
|
|
|
if (command) {
|
|
|
|
|
vsctl_context_done_command(ctx, command);
|
|
|
|
|
}
|
|
|
|
|
vsctl_context_invalidate_cache(ctx);
|
|
|
|
|
}
|
|
|
|
|
|
2010-11-16 09:15:40 -08:00
|
|
|
|
static void
|
|
|
|
|
run_prerequisites(struct vsctl_command *commands, size_t n_commands,
|
|
|
|
|
struct ovsdb_idl *idl)
|
|
|
|
|
{
|
|
|
|
|
struct vsctl_command *c;
|
|
|
|
|
|
|
|
|
|
ovsdb_idl_add_table(idl, &ovsrec_table_open_vswitch);
|
2010-11-16 12:23:12 -08:00
|
|
|
|
if (wait_for_reload) {
|
|
|
|
|
ovsdb_idl_add_column(idl, &ovsrec_open_vswitch_col_cur_cfg);
|
|
|
|
|
}
|
2010-11-16 09:15:40 -08:00
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
if (c->syntax->prerequisites) {
|
|
|
|
|
struct vsctl_context ctx;
|
|
|
|
|
|
|
|
|
|
ds_init(&c->output);
|
2011-02-08 16:10:34 -08:00
|
|
|
|
c->table = NULL;
|
2010-11-16 09:15:40 -08:00
|
|
|
|
|
|
|
|
|
vsctl_context_init(&ctx, c, idl, NULL, NULL, NULL);
|
|
|
|
|
(c->syntax->prerequisites)(&ctx);
|
|
|
|
|
vsctl_context_done(&ctx, c);
|
|
|
|
|
|
2012-11-06 13:14:55 -08:00
|
|
|
|
ovs_assert(!c->output.string);
|
|
|
|
|
ovs_assert(!c->table);
|
2010-11-16 09:15:40 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-03-27 10:16:52 -07:00
|
|
|
|
static void
|
2010-01-28 16:09:26 -08:00
|
|
|
|
do_vsctl(const char *args, struct vsctl_command *commands, size_t n_commands,
|
|
|
|
|
struct ovsdb_idl *idl)
|
2009-12-08 17:18:12 -08:00
|
|
|
|
{
|
|
|
|
|
struct ovsdb_idl_txn *txn;
|
|
|
|
|
const struct ovsrec_open_vswitch *ovs;
|
|
|
|
|
enum ovsdb_idl_txn_status status;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
struct ovsdb_symbol_table *symtab;
|
2012-04-17 17:07:00 -07:00
|
|
|
|
struct vsctl_context ctx;
|
2010-01-28 16:09:26 -08:00
|
|
|
|
struct vsctl_command *c;
|
2011-03-01 13:11:56 -08:00
|
|
|
|
struct shash_node *node;
|
2010-01-20 14:19:47 -05:00
|
|
|
|
int64_t next_cfg = 0;
|
2010-07-15 18:04:10 -07:00
|
|
|
|
char *error = NULL;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-02-02 14:26:17 -08:00
|
|
|
|
txn = the_idl_txn = ovsdb_idl_txn_create(idl);
|
2009-12-11 11:28:36 -08:00
|
|
|
|
if (dry_run) {
|
|
|
|
|
ovsdb_idl_txn_set_dry_run(txn);
|
|
|
|
|
}
|
2009-12-11 10:40:55 -08:00
|
|
|
|
|
2010-03-08 14:18:44 -08:00
|
|
|
|
ovsdb_idl_txn_add_comment(txn, "ovs-vsctl: %s", args);
|
2009-12-16 13:30:53 -08:00
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovs = ovsrec_open_vswitch_first(idl);
|
|
|
|
|
if (!ovs) {
|
2009-12-11 10:40:55 -08:00
|
|
|
|
/* XXX add verification that table is empty */
|
|
|
|
|
ovs = ovsrec_open_vswitch_insert(txn);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2009-12-16 16:26:17 -08:00
|
|
|
|
if (wait_for_reload) {
|
2012-04-12 08:25:10 -07:00
|
|
|
|
ovsdb_idl_txn_increment(txn, &ovs->header_,
|
|
|
|
|
&ovsrec_open_vswitch_col_next_cfg);
|
2009-12-16 16:26:17 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-06-02 11:08:03 -07:00
|
|
|
|
symtab = ovsdb_symbol_table_create();
|
2010-06-24 11:01:53 -07:00
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
ds_init(&c->output);
|
2011-02-08 16:10:34 -08:00
|
|
|
|
c->table = NULL;
|
2010-06-24 11:01:53 -07:00
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_init(&ctx, NULL, idl, txn, ovs, symtab);
|
2010-01-28 16:09:26 -08:00
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_init_command(&ctx, c);
|
2011-06-06 11:40:10 -07:00
|
|
|
|
if (c->syntax->run) {
|
|
|
|
|
(c->syntax->run)(&ctx);
|
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_done_command(&ctx, c);
|
2010-06-24 11:01:53 -07:00
|
|
|
|
|
|
|
|
|
if (ctx.try_again) {
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_done(&ctx, NULL);
|
2010-06-24 11:01:53 -07:00
|
|
|
|
goto try_again;
|
|
|
|
|
}
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2012-04-17 17:07:00 -07:00
|
|
|
|
vsctl_context_done(&ctx, NULL);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2011-03-01 13:11:56 -08:00
|
|
|
|
SHASH_FOR_EACH (node, &symtab->sh) {
|
|
|
|
|
struct ovsdb_symbol *symbol = node->data;
|
|
|
|
|
if (!symbol->created) {
|
|
|
|
|
vsctl_fatal("row id \"%s\" is referenced but never created (e.g. "
|
|
|
|
|
"with \"-- --id=%s create ...\")",
|
|
|
|
|
node->name, node->name);
|
|
|
|
|
}
|
2011-03-10 11:15:01 -08:00
|
|
|
|
if (!symbol->strong_ref) {
|
|
|
|
|
if (!symbol->weak_ref) {
|
|
|
|
|
VLOG_WARN("row id \"%s\" was created but no reference to it "
|
|
|
|
|
"was inserted, so it will not actually appear in "
|
|
|
|
|
"the database", node->name);
|
|
|
|
|
} else {
|
|
|
|
|
VLOG_WARN("row id \"%s\" was created but only a weak "
|
|
|
|
|
"reference to it was inserted, so it will not "
|
|
|
|
|
"actually appear in the database", node->name);
|
|
|
|
|
}
|
|
|
|
|
}
|
2011-02-28 12:45:16 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-03-03 12:55:39 -08:00
|
|
|
|
status = ovsdb_idl_txn_commit_block(txn);
|
2009-12-16 16:26:17 -08:00
|
|
|
|
if (wait_for_reload && status == TXN_SUCCESS) {
|
|
|
|
|
next_cfg = ovsdb_idl_txn_get_increment_new_value(txn);
|
|
|
|
|
}
|
2010-05-18 14:16:43 -07:00
|
|
|
|
if (status == TXN_UNCHANGED || status == TXN_SUCCESS) {
|
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
if (c->syntax->postprocess) {
|
|
|
|
|
struct vsctl_context ctx;
|
|
|
|
|
|
2010-06-02 11:08:03 -07:00
|
|
|
|
vsctl_context_init(&ctx, c, idl, txn, ovs, symtab);
|
2010-05-18 14:16:43 -07:00
|
|
|
|
(c->syntax->postprocess)(&ctx);
|
|
|
|
|
vsctl_context_done(&ctx, c);
|
|
|
|
|
}
|
2010-01-28 13:33:24 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
2010-02-05 14:11:12 -08:00
|
|
|
|
error = xstrdup(ovsdb_idl_txn_get_error(txn));
|
2009-12-08 17:18:12 -08:00
|
|
|
|
ovsdb_idl_txn_destroy(txn);
|
2010-10-22 17:25:02 -07:00
|
|
|
|
txn = the_idl_txn = NULL;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
switch (status) {
|
2011-06-20 16:17:44 -07:00
|
|
|
|
case TXN_UNCOMMITTED:
|
2009-12-08 17:18:12 -08:00
|
|
|
|
case TXN_INCOMPLETE:
|
2013-12-17 10:32:12 -08:00
|
|
|
|
OVS_NOT_REACHED();
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
case TXN_ABORTED:
|
|
|
|
|
/* Should not happen--we never call ovsdb_idl_txn_abort(). */
|
2009-12-10 16:05:20 -08:00
|
|
|
|
vsctl_fatal("transaction aborted");
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2009-12-16 16:26:17 -08:00
|
|
|
|
case TXN_UNCHANGED:
|
2009-12-08 17:18:12 -08:00
|
|
|
|
case TXN_SUCCESS:
|
|
|
|
|
break;
|
|
|
|
|
|
2012-03-27 10:16:52 -07:00
|
|
|
|
case TXN_TRY_AGAIN:
|
2010-06-24 11:01:53 -07:00
|
|
|
|
goto try_again;
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
|
|
|
|
case TXN_ERROR:
|
2010-02-05 14:11:12 -08:00
|
|
|
|
vsctl_fatal("transaction error: %s", error);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2011-07-26 16:49:03 -07:00
|
|
|
|
case TXN_NOT_LOCKED:
|
|
|
|
|
/* Should not happen--we never call ovsdb_idl_set_lock(). */
|
|
|
|
|
vsctl_fatal("database not locked");
|
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
default:
|
2013-12-17 10:32:12 -08:00
|
|
|
|
OVS_NOT_REACHED();
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2010-02-05 14:11:12 -08:00
|
|
|
|
free(error);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
|
2010-06-24 11:01:53 -07:00
|
|
|
|
ovsdb_symbol_table_destroy(symtab);
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
struct ds *ds = &c->output;
|
2010-06-02 11:08:03 -07:00
|
|
|
|
|
2011-02-08 16:10:34 -08:00
|
|
|
|
if (c->table) {
|
|
|
|
|
table_print(c->table, &table_style);
|
|
|
|
|
} else if (oneline) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
|
|
ds_chomp(ds, '\n');
|
|
|
|
|
for (j = 0; j < ds->length; j++) {
|
2010-09-02 10:09:09 -07:00
|
|
|
|
int ch = ds->string[j];
|
|
|
|
|
switch (ch) {
|
2009-12-08 17:18:12 -08:00
|
|
|
|
case '\n':
|
|
|
|
|
fputs("\\n", stdout);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
case '\\':
|
|
|
|
|
fputs("\\\\", stdout);
|
|
|
|
|
break;
|
|
|
|
|
|
|
|
|
|
default:
|
2010-09-02 10:09:09 -07:00
|
|
|
|
putchar(ch);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
putchar('\n');
|
|
|
|
|
} else {
|
|
|
|
|
fputs(ds_cstr(ds), stdout);
|
|
|
|
|
}
|
2010-02-02 14:27:22 -08:00
|
|
|
|
ds_destroy(&c->output);
|
2011-02-08 16:10:34 -08:00
|
|
|
|
table_destroy(c->table);
|
|
|
|
|
free(c->table);
|
2010-06-02 11:08:03 -07:00
|
|
|
|
|
2012-05-22 03:47:36 -07:00
|
|
|
|
shash_destroy_free_data(&c->options);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
2010-02-02 14:27:22 -08:00
|
|
|
|
free(commands);
|
2009-12-16 16:26:17 -08:00
|
|
|
|
|
|
|
|
|
if (wait_for_reload && status != TXN_UNCHANGED) {
|
|
|
|
|
for (;;) {
|
|
|
|
|
ovsdb_idl_run(idl);
|
|
|
|
|
OVSREC_OPEN_VSWITCH_FOR_EACH (ovs, idl) {
|
|
|
|
|
if (ovs->cur_cfg >= next_cfg) {
|
|
|
|
|
goto done;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
ovsdb_idl_wait(idl);
|
|
|
|
|
poll_block();
|
|
|
|
|
}
|
|
|
|
|
done: ;
|
|
|
|
|
}
|
2010-02-02 14:27:22 -08:00
|
|
|
|
ovsdb_idl_destroy(idl);
|
2009-12-16 16:26:17 -08:00
|
|
|
|
|
2009-12-08 17:18:12 -08:00
|
|
|
|
exit(EXIT_SUCCESS);
|
2010-06-24 11:01:53 -07:00
|
|
|
|
|
|
|
|
|
try_again:
|
|
|
|
|
/* Our transaction needs to be rerun, or a prerequisite was not met. Free
|
|
|
|
|
* resources and return so that the caller can try again. */
|
2010-10-22 17:25:02 -07:00
|
|
|
|
if (txn) {
|
|
|
|
|
ovsdb_idl_txn_abort(txn);
|
|
|
|
|
ovsdb_idl_txn_destroy(txn);
|
2013-04-10 11:55:06 -07:00
|
|
|
|
the_idl_txn = NULL;
|
2010-10-22 17:25:02 -07:00
|
|
|
|
}
|
2010-06-24 11:01:53 -07:00
|
|
|
|
ovsdb_symbol_table_destroy(symtab);
|
|
|
|
|
for (c = commands; c < &commands[n_commands]; c++) {
|
|
|
|
|
ds_destroy(&c->output);
|
2011-02-08 16:10:34 -08:00
|
|
|
|
table_destroy(c->table);
|
|
|
|
|
free(c->table);
|
2010-06-24 11:01:53 -07:00
|
|
|
|
}
|
|
|
|
|
free(error);
|
2009-12-08 17:18:12 -08:00
|
|
|
|
}
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
static const struct vsctl_command_syntax all_commands[] = {
|
|
|
|
|
/* Open vSwitch commands. */
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"init", 0, 0, NULL, cmd_init, NULL, "", RW},
|
2011-05-24 13:03:58 -07:00
|
|
|
|
{"show", 0, 0, pre_cmd_show, cmd_show, NULL, "", RO},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Bridge commands. */
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"add-br", 1, 3, pre_get_info, cmd_add_br, NULL, "--may-exist", RW},
|
|
|
|
|
{"del-br", 1, 1, pre_get_info, cmd_del_br, NULL, "--if-exists", RW},
|
2012-11-30 18:50:18 -08:00
|
|
|
|
{"list-br", 0, 0, pre_get_info, cmd_list_br, NULL, "--real,--fake", RO},
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"br-exists", 1, 1, pre_get_info, cmd_br_exists, NULL, "", RO},
|
|
|
|
|
{"br-to-vlan", 1, 1, pre_get_info, cmd_br_to_vlan, NULL, "", RO},
|
|
|
|
|
{"br-to-parent", 1, 1, pre_get_info, cmd_br_to_parent, NULL, "", RO},
|
2010-11-18 14:36:53 -08:00
|
|
|
|
{"br-set-external-id", 2, 3, pre_cmd_br_set_external_id,
|
|
|
|
|
cmd_br_set_external_id, NULL, "", RW},
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"br-get-external-id", 1, 2, pre_cmd_br_get_external_id,
|
|
|
|
|
cmd_br_get_external_id, NULL, "", RO},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Port commands. */
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"list-ports", 1, 1, pre_get_info, cmd_list_ports, NULL, "", RO},
|
|
|
|
|
{"add-port", 2, INT_MAX, pre_get_info, cmd_add_port, NULL, "--may-exist",
|
|
|
|
|
RW},
|
|
|
|
|
{"add-bond", 4, INT_MAX, pre_get_info, cmd_add_bond, NULL,
|
|
|
|
|
"--may-exist,--fake-iface", RW},
|
|
|
|
|
{"del-port", 1, 2, pre_get_info, cmd_del_port, NULL,
|
|
|
|
|
"--if-exists,--with-iface", RW},
|
|
|
|
|
{"port-to-br", 1, 1, pre_get_info, cmd_port_to_br, NULL, "", RO},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Interface commands. */
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"list-ifaces", 1, 1, pre_get_info, cmd_list_ifaces, NULL, "", RO},
|
|
|
|
|
{"iface-to-br", 1, 1, pre_get_info, cmd_iface_to_br, NULL, "", RO},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
|
|
|
|
/* Controller commands. */
|
2010-12-08 14:24:59 -08:00
|
|
|
|
{"get-controller", 1, 1, pre_controller, cmd_get_controller, NULL, "", RO},
|
|
|
|
|
{"del-controller", 1, 1, pre_controller, cmd_del_controller, NULL, "", RW},
|
|
|
|
|
{"set-controller", 1, INT_MAX, pre_controller, cmd_set_controller, NULL,
|
|
|
|
|
"", RW},
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"get-fail-mode", 1, 1, pre_get_info, cmd_get_fail_mode, NULL, "", RO},
|
|
|
|
|
{"del-fail-mode", 1, 1, pre_get_info, cmd_del_fail_mode, NULL, "", RW},
|
|
|
|
|
{"set-fail-mode", 2, 2, pre_get_info, cmd_set_fail_mode, NULL, "", RW},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
2011-02-04 13:30:02 -08:00
|
|
|
|
/* Manager commands. */
|
|
|
|
|
{"get-manager", 0, 0, pre_manager, cmd_get_manager, NULL, "", RO},
|
2012-10-15 16:47:49 -07:00
|
|
|
|
{"del-manager", 0, 0, pre_manager, cmd_del_manager, NULL, "", RW},
|
2011-02-04 13:30:02 -08:00
|
|
|
|
{"set-manager", 1, INT_MAX, pre_manager, cmd_set_manager, NULL, "", RW},
|
|
|
|
|
|
2010-01-28 16:09:26 -08:00
|
|
|
|
/* SSL commands. */
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"get-ssl", 0, 0, pre_cmd_get_ssl, cmd_get_ssl, NULL, "", RO},
|
|
|
|
|
{"del-ssl", 0, 0, pre_cmd_del_ssl, cmd_del_ssl, NULL, "", RW},
|
|
|
|
|
{"set-ssl", 3, 3, pre_cmd_set_ssl, cmd_set_ssl, NULL, "--bootstrap", RW},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
|
2010-04-30 15:06:51 -07:00
|
|
|
|
/* Switch commands. */
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"emer-reset", 0, 0, pre_cmd_emer_reset, cmd_emer_reset, NULL, "", RW},
|
2010-04-30 15:06:51 -07:00
|
|
|
|
|
2011-06-06 11:40:10 -07:00
|
|
|
|
/* Database commands. */
|
|
|
|
|
{"comment", 0, INT_MAX, NULL, NULL, NULL, "", RO},
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"get", 2, INT_MAX, pre_cmd_get, cmd_get, NULL, "--if-exists,--id=", RO},
|
2013-01-15 13:23:53 -08:00
|
|
|
|
{"list", 1, INT_MAX, pre_cmd_list, cmd_list, NULL,
|
|
|
|
|
"--if-exists,--columns=", RO},
|
2011-02-08 10:21:59 -08:00
|
|
|
|
{"find", 1, INT_MAX, pre_cmd_find, cmd_find, NULL, "--columns=", RO},
|
2013-01-15 13:23:53 -08:00
|
|
|
|
{"set", 3, INT_MAX, pre_cmd_set, cmd_set, NULL, "--if-exists", RW},
|
|
|
|
|
{"add", 4, INT_MAX, pre_cmd_add, cmd_add, NULL, "--if-exists", RW},
|
|
|
|
|
{"remove", 4, INT_MAX, pre_cmd_remove, cmd_remove, NULL, "--if-exists",
|
|
|
|
|
RW},
|
|
|
|
|
{"clear", 3, INT_MAX, pre_cmd_clear, cmd_clear, NULL, "--if-exists", RW},
|
2011-03-10 11:15:01 -08:00
|
|
|
|
{"create", 2, INT_MAX, pre_create, cmd_create, post_create, "--id=", RW},
|
2012-05-16 11:39:55 -07:00
|
|
|
|
{"destroy", 1, INT_MAX, pre_cmd_destroy, cmd_destroy, NULL,
|
|
|
|
|
"--if-exists,--all", RW},
|
2010-11-16 09:15:40 -08:00
|
|
|
|
{"wait-until", 2, INT_MAX, pre_cmd_wait_until, cmd_wait_until, NULL, "",
|
|
|
|
|
RO},
|
|
|
|
|
|
|
|
|
|
{NULL, 0, 0, NULL, NULL, NULL, NULL, RO},
|
2010-01-28 16:09:26 -08:00
|
|
|
|
};
|
2009-12-10 13:28:22 -08:00
|
|
|
|
|
2013-07-19 10:04:47 -07:00
|
|
|
|
static const struct vsctl_command_syntax *get_all_commands(void)
|
|
|
|
|
{
|
|
|
|
|
return all_commands;
|
|
|
|
|
}
|